📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 11, ISSUE 5, MAY 2022

ENDPOINT PROTECTION MEASURING THE EFFECTIVENESS OF INSIDER THREAT REMEDIATION TECHNOLOGIES AND METHODOLOGIES

Mr.N.Karthikeyan, MS.N.Kalaiselvi, Mr.P.Nagarajan

DOI: 10.17148/IJARCCE.2022.11517

Abstract: According to the research, employee training aimed at raising awareness of the importance of preserving the organization's sensitive data is ineffective.Furthermore, popular third-party cloud services make it much more difficult for employees to safeguard their company's secrets. As a result of this critical issue, a considerable market for software products that enable endpoint data security for these businesses has emerged. Endpoint protection platform (EPP), a conventional, negative endpoint protection strategy, and endpoint detection and response, a novel, positive endpoint protection method, will be discussed in our research (EDR). There will also be a comparison and evaluation of EPP and EDR in terms of mechanism and effectiveness.The study will also look at the benefits, flaws, and critical characteristics that a good security programme should have. The goal of this paper is to help small and large businesses better comprehend insider dangers in today's fast evolving internet, which is full with potential threats and attacks. This will also help businesses gain a better understanding of their employees' endpoints, allowing them to prevent data leaks in the future. It will also assist careless users in understanding the gravity of the problem they are facing and how they should protect their privacy while surfing the Internet while connected to the company's network.

How to Cite:

[1] Mr.N.Karthikeyan, MS.N.Kalaiselvi, Mr.P.Nagarajan, “ENDPOINT PROTECTION MEASURING THE EFFECTIVENESS OF INSIDER THREAT REMEDIATION TECHNOLOGIES AND METHODOLOGIES,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2022.11517