Endpoint Security

Triumfant Unveils Mac Endpoint Security Monitoring Agent

Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X.

Announced at the Gartner Security & Risk Management Summit, the new endpoint security agent provides real-time detection and automatic remediation of malware and other sophisticated attacks occurring in-memory or on a hard drive, the company said.

<p><span><span><strong>Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X. </strong></span></span></p><p><span><span>Announced at the Gartner Security & Risk Management Summit, the new endpoint security agent provides real-time detection and automatic remediation of malware and other sophisticated attacks occurring in-memory or on a hard drive, the company said. </span></span></p>

Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X.

Announced at the Gartner Security & Risk Management Summit, the new endpoint security agent provides real-time detection and automatic remediation of malware and other sophisticated attacks occurring in-memory or on a hard drive, the company said.

While Mac-based systems have not been attacked nearly to the level that Windows-based PCs have, the increased popularity and volume of Mac systems in the enterprise makes them an attractive target for attackers to exploit.

“Cyber criminals and nation-state actors are becoming increasingly sophisticated and creative in their exploits, constructing targeted attacks that evade traditional endpoint defenses,” said John Prisco, CEO of Triumfant. “Most security teams can’t detect or react fast enough to these inevitable threats.”

Triumfant’s suite of threat detection and remediation tools use pattern-matching mathematics, machine learning and patented analytics to find, investigate and respond to anomalous activities on the endpoint.

According to Triumfant, its system uses no signatures or indicators of compromise and continuously monitors an organization’s entire machine population, including more than 500,000 state attributes per machine, to generate an analysis of an attack.

Furthermore, Triumfant constructs a situational remediation in attempt to stop the attack and repair damage to the machine within minutes of a breach.

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version