Tue, Aug 21 2018, 10:56 pm

eScan intros TSPM technology to combat RDP cyber attacks

By Digital Edge Bureau, 05.10.2017, 23:10
 
Cyber_Security_1

eScan offers endpoint security solution carrying TSPM technology to fight against RDP attacks

With each passing day, the cyber attacks turn complex and enterprises find it challenging to combat against the assaults. Now, a slew of reports suggest that RDP (remote desktop protocol) servers come under ransomware attacks which can jeopardize the very operations of firms and organizations.
To facilitate centralized management of computers, organizations implement RDP and access these systems either through LAN or Internet. In order to protect RDP enabled systems from outsiders, VPN might be implemented but in majority of cases, administrators configure the firewall to open up RDP for the systems they would want to manage remotely. The pen-testing platforms such as Kali offer RDP Bruteforce and Exploit tools which are being specifically used for targeting systems with Internet facing RDP systems. Bruteforce attack would generate large numbers of Failed Login Notifications and are logged. Furthermore, the users are not even aware of the on-going Brute Force attack, since it is not imperative that the attack would take place when the user would be logged in and working on the system.
Now, eScan’s Terminal Services Protection Module (TSPM) not just detects these brute force attempts but also heuristically identifies suspicious IP Addresses  and blocks any access attempts from them and in order to safeguard the systems from future attacks, the IP addresses and Hosts from future attacks are banned from initiating any further connections to the system.
This has been known that attackers would try to uninstall security applications from compromised systems in order to cover up their tracks and stop the administrators from getting alerted about the breach.  eScan TSPM detects and stops these attempts too, moreover the administrators are also alerted about the preventive measures initiated by TSPM.
In the present landscape where attackers are trying to exploit every known weakness be it unpatched systems or inability of the users to maintain password hygiene, eScan’s TSPM would protect organizations from such attacks.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


nine − 1 =

Other articlesgo to homepage

Fortinet again cautions parents to protect children online

Fortinet again cautions parents to protect children online(0)

Reiterating firmly, Fortinet, world’s leading network security systems & solutions provider, has cautioned parents to supervise children’s online activities, and educate them on safe surfing. The Internet provides unprecedented opportunities for children to communicate, learn and develop new skills. However,parents need to be aware that predators lurk online and could potentially expose children to inappropriate

Trend Micro brings in Connected Threat Defense mechanism

Trend Micro brings in Connected Threat Defense mechanism(0)

Taking a holistic approach to defending today’s firms and organizations against cyber-attacks, Trend Micro, has come out with the Connected Threat Defense mechanism, which helps protect, detect, and respond quite effectively. With a 360-degree monitoring of network traffic, Trend Micro’s Connected Threat Defense is powered by XGen security and currently supported and leveraged by all

Kaspersky Lab ropes in Inflow Technologies as B2B distie

Kaspersky Lab ropes in Inflow Technologies as B2B distie(0)

For addressing the growing enterprise security market in India much better, Kaspersky Lab has roped in Inflow Technologies, India’s one of the leading security value added distributors (VADs). This has been a highly anticipated move by the great Russian endpoint security firm ever since Stephan Neumeier has joined Kaspersky Lab Asia-Pacific as its Managing Director.

McAfee intros MVISION portfolio of enterprise security

McAfee intros MVISION portfolio of enterprise security(0)

McAfee has come out with McAfee MVISION, a first-of-its-kind product portfolio featuring new McAfee innovations designed to give customers a comprehensive, flexible defense system that manages their security products based on their needs and in the future as they continue to move to modern device operating systems and to the cloud. The MVISION strengthens the

Conforming seamlessly to EU’s GDPR compliance norms

Conforming seamlessly to EU’s GDPR compliance norms(0)

The General Data Protection Regulation (GDPR), adopted in April 2016 after four years of deliberations, is now in force. The regulation made headlines around the globe with its stricter data protection standards, substantial fines, and most of all, extensive reach. The GDPR affects any organization that holds an EU (European Union) citizen’s personal data, no

read more
banner

Contacts and information

New Delhi (India)

Social networks

Most popular categories