Endgame provides a cyber operations platform supporting the detection, exploitation, and mitigation of cyber-threats. Endgame was started by executives from ISS (Internet Security Systems).

Wikipedia
Endgame
Endgame
Blog Post
  • Cryptomining malware has garnered significant attention in light of a range of disconnected and impactful incidents, including attacks on water utilities, hospitals, Android devices and government websites. With the cryptocurrency market anticipated to hit $1 trillion in 2018, the recent surge in cryptomining malware is not surprising. In cryptomining attacks, attackers often hijack a computer thr...

Endgame
Endgame
Blog Post
  • The International Olympic Committee confirmed that the 2018 opening ceremonies experienced a range of digital attacks, resulting in internet disruption and containing the capability to cause destruction. Talos quickly posted an excellent blogpost Monday that described a malware family they dubbed “Olympic Destroyer” as the culprit behind the attacks, and provided the first information about samp...

Endgame
Endgame
Landing Page

Request a demo of the Endgame Platform

 
Endgame
Endgame
Blog Post
  • Over the last several years, various waves of machine learning (ML) adoption have disrupted information security products and services.  Based on my limited retention of electromagnetic wave propagation theory from graduate studies, the idiomatic use of waves seems wholly appropriate.  The market reaction to ML has been not unlike a transverse wave that displaces particles in orthogonal directions...

Endgame
Endgame
Blog Post
  • I’m excited to share that Gartner has named Endgame a “Visionary” in the 2018 Magic Quadrant for Endpoint Protection Platforms. Gartner initially explored the entire market of endpoint vendors. Of the 21 top vendors included in the final evaluation, Endgame was ranked third on “completeness of vision,” which Gartner defines as the degree to which vendors understand current and future customer requ...

Endgame
Endgame
Blog Post
  • For many, entering the information security (infosec) industry is elusive and confusing, with mixed signals and conflicting information about what background or skills are required. The reality is that there is no single path into the industry. Despite the monochromatic portrayals of the community in popular culture and media, the infosec community consists of experts from a diverse range of disci...

Endgame
Endgame
Blog Post
  • Policy and law lag behind technological change. Nowhere is this more obvious than in infosec, where legal and policy frameworks remain mired in Cold War debates despite over two decades worth of high profile cyber attacks and data theft. This is all beginning to change. We are at a significant inflection point where countries are rapidly implementing policies that are dramatically shaping the futu...

Endgame
Endgame
Blog Post
  • For several years, security researchers have been working on a new type of hardware attack that exploits cache side-effects and speculative execution to perform privileged memory disclosure. Last week, a blog post by Jann Horn of Google and the release of two white papers by multiple researchers set off a frenzy of public panic and speculation. These new vulnerability classes consisted of two dist...

Endgame
Endgame
Blog Post
  • A newly released processor vulnerability has quickly sparked the first major security panic of 2018. With terms like Kernel page table isolation, speculative execution, and cache timing, it is difficult to grasp the full implications of this vulnerability. Mix in names like Meltdown and Spectre and there is even more information to digest and understand before making an educated decision to patch,...

Endgame
Endgame
Blog Post
  • With less than six months to go before the European Union’s General Data Protection Regulation (GDPR) goes into effect, companies are still uncertain if or how it will impact them. A recent study found that 60% of E.U. respondents and 50% of U.S. respondents believe they will face serious challenges in becoming compliant. At the same time, only 38% are prioritizing GDPR compliance. In the U.S., m...

Endgame
Endgame
Blog Post
  • Many security products provide a never-ending stream of alerts, and fail to provide the necessary context and capabilities to support the next stage of analysis. For an analyst to grasp the implications and take action, more context is required, such as the severity and confidence of the alert, was it targeted, and whether it is an anomaly or has previously occurred.  At Endgame, our focus on the ...

Endgame
Endgame
Blog Post
  • Since 2013, the Worldwide Threat Assessment of the U.S. Intelligence Community has listed the cyber threat as the number one national security and economic security threat. From interference in global elections to critical infrastructure attacks to compromising worldwide banking systems, adversaries increasingly pursue digital means to achieve various objectives, including espionage, financial gai...

Endgame
Endgame
Blog Post
  • After six years of coordinated cyber attacks and data theft, the U.S. Department of Justice (DoJ) issued indictments yesterday against three members of the Chinese threat group known as APT 3 or Gothic Panda. The indictments specifically address data theft and corporate espionage against Siemens, Moody’s Analytics, and Trimble, a company that develops navigation satellite systems.  These indictmen...

Endgame
Endgame
Blog Post
  • When WannaCry ransomware paralyzed and created chaos throughout Britain’s National Health System earlier this year, it became abundantly clear that hospitals and healthcare providers are not immune to opportunistic or targeted attacks. As targeted attacks continue to rise, endpoints and servers that access electronic personal health information (ePHI) and electronic medical record (EMR) are prime ...

Endgame
Endgame
Blog Post
  • Last week, Endgame CEO Nate Fick and The New York Times reporter Nicole Perlroth discussed the future of cyberwar and its impact on national security at the Computer History Museum in Mountain View, CA. The conversation ranged from the asymmetric nature of today’s cyber attacks to the difficulty of attribution to how the US government can successfully deter its enemies in the digital domain. The e...

Endgame
Endgame
Blog Post
  • Yesterday, the House Foreign Affairs Committee voted on numerous bills by voice vote. The Cyber Diplomacy Act (CDA) was included in this legislative push. First introduced in September, the Cyber Diplomacy Act has bipartisan support with nine Democrat and six Republican cosponsors. The CDA covers a broad range of issues which together provide the foundation for the U.S. to “work internationally to...

Endgame
Endgame
Blog Post
  • Last year, we had that rare opportunity to reflect upon our UI architecture and evaluate whether it would continue to serve us going forward. In the end, we decided to take a fundamentally new approach. Under the new architecture, the UI would now be a client-side application filled with visualizations and complex interactions. Our frontend team critically reviewed our previous UI application to d...

Endgame
Endgame
Blog Post
  • Malware authors frequently add signatures from expired or compromised certificates to bypass AV products that don’t validate those signatures correctly. Last week, researchers from the University of Maryland presented evidence that this technique is much more widespread than previously believed. Their research was highlighted at the ACM Conference on Computer and Communications Security and in an ...

Endgame
Endgame
Blog Post
  • Today, we released the 2.5 version of the Endgame platform. This new release extends the scope, speed, and simplicity of our platform with new prevention, detection and response, and automated threat hunting capabilities. Our newest features Endgame Resolver™ with Endgame Artemis® enhancements provides analysts with the simplest visual experience and turn by turn guidance to contain and remediate ...

Endgame
Endgame
Blog Post
  • Security professionals from academia and industry gather this week in Dayton, OH for the annual National Initiative for Cybersecurity Education (NICE) Conference and Expo.  NICE is a program of the National Institute for Standards and Technology, and focuses on the cybersecurity workforce, education, and training needs of the nation. As part of this conference, I am presenting my research on impro...

Endgame
Endgame
Blog Post
  • BadRabbit is the latest auto-propagating ransomware making the rounds and disrupting organizations.  We previously went deep into the technical details.  This post will describe our testing of BadRabbit in the presence of our endpoint protection platform.  I didn’t want to rush to join the pack for self-congratulations along the lines of, “Look, Vendor X would have protected you!” posts and emails...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.