Most of today?s security is still stuck in the world of reactive. Solutions still look for known attacks, but are almost defenseless against unknown malware or exploits. However, new, Next-Generation Endpoint Protection technologies take a new approach, looking at the system behavior to identify suspicious activity. This paper identifies the six key features to look for when assessing Next Generation Endpoint Protection technologies. |