{"id":126522,"date":"2020-03-19T14:44:41","date_gmt":"2020-03-19T18:44:41","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=126522"},"modified":"2023-05-04T11:26:08","modified_gmt":"2023-05-04T15:26:08","slug":"endpoint-protection","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/","title":{"rendered":"Endpoint Protection"},"content":{"rendered":"<div id=\"bbvista8\">\n<p><img loading=\"lazy\" src=\"\/tech\/files\/2020\/03\/crowdstrike-logo-636x446.jpg\" alt=\"\" class=\"wp-image-126728 alignright\" width=\"205\" height=\"144\" srcset=\"https:\/\/www.bu.edu\/tech\/files\/2020\/03\/crowdstrike-logo-636x446.jpg 636w, https:\/\/www.bu.edu\/tech\/files\/2020\/03\/crowdstrike-logo-768x538.jpg 768w, https:\/\/www.bu.edu\/tech\/files\/2020\/03\/crowdstrike-logo-1024x718.jpg 1024w, https:\/\/www.bu.edu\/tech\/files\/2020\/03\/crowdstrike-logo.jpg 1288w\" sizes=\"(max-width: 205px) 100vw, 205px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>IS&amp;T offers site licensed software, information, and support for securing your computer and protecting it from viruses, spyware, and other malicious behavior.<\/p>\n<p>You can keep your computer running safely by installing this next-gen endpoint protection software and making appropriate security and update settings, as documented on our support pages. Should your computer become infected with viruses or spyware, IS&amp;T offers software and services to help you remove them.<\/p>\n<h2 style=\"text-align: left;\">Key Features<\/h2>\n<table style=\"border: 1px solid #FFFFFF;\">\n<tbody>\n<tr>\n<td>\n<ul>\n<li style=\"text-align: left;\">Ransomware prevention<\/li>\n<li style=\"text-align: left;\">Endpoint detection and response<\/li>\n<li style=\"text-align: left;\">Next-Gen Antivirus<\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li style=\"text-align: left;\">Threat intelligence<\/li>\n<li style=\"text-align: left;\">Incident Response<\/li>\n<li style=\"text-align: left;\">Zero-day Exploit Prevention<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>FAQs<\/h2>\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">What is Endpoint Protection?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><br \/>\n<span class=\"st\"><em>Endpoint protection, <\/em>also referred to as Endpoint Security, is a term used to describe security solutions that address <em>endpoint<\/em> security issues, securing and <em>protecting<\/em> endpoints against zero-day exploits, attacks, and inadvertent data leakage resulting from human error.\u00a0 Our Endpoint Protection platform is used to protect our devices (desktops and laptops) from potential threats.\u00a0 We are using CrowdStrike as the Endpoint Protection application of choice. \u00a0<\/span><br \/>\n<\/div>\n<\/div>\n\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Why CrowdStrike?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><br \/>\nCrowdStrike is one of the leading endpoint protection vendors in the industry. With the CrowdStrike platform, we have the ability to stop breaches via a unified set of cloud-delivered technologies that prevent all types of attacks \u2014 including malware and much more. Today\u2019s sophisticated attackers are going \u201cbeyond malware\u201d to breach organizations, increasingly relying on exploits, zero days, and hard-to-detect methods such as credential theft and tools that are already part of the victim\u2019s environment or operating system, such as PowerShell.<\/p>\n<p>CrowdStrike aides us with those challenges with a powerful and lightweight solution that unifies next-generation antivirus (NGAV), endpoint detection and response (EDR), cyber threat intelligence, managed threat hunting capabilities and security hygiene.<\/p>\n<p><a href=\"https:\/\/www.crowdstrike.com\/epp-101\/next-generation-antivirus-ngav\/\">See more on next-generation antivirus (NGAV)<\/a><br \/>\n<\/div>\n<\/div>\n\n<div class=\"bu_collapsible_container  bu_collapsible_open\" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Who is qualified to use CrowdStrike?<\/h3><div class=\"bu_collapsible_section\" ><br \/>\nCrowdStrike is available to BU faculty, staff and students for both institutionally owned and personally owned desktops and laptops.<\/p>\n<ul>\n<li>For BU owned assets, please contact your local IT support team to ensure you are protected.<\/li>\n<li>If you are interested in using CrowdStrike on a personally owned desktop or laptop you can download the latest version <a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/crowdstrike-installation\/\">here<\/a>.<\/li>\n<\/ul>\n<p><\/div>\n<\/div>\n\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Will CrowdStrike affect performance on my machine?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><br \/>\nNo.\u00a0 The application is very lightweight and uses minimal resources to protect your machine.<br \/>\n<\/div>\n<\/div>\n\n<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">What do I do if I believe CrowdStrike is causing issues on my machine?<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><br \/>\nContact us. Submit a ticket to <a href=\"mailto:ithelp@bu.edu\">ithelp@bu.edu<\/a> or call us at 353-HELP(4357) and we will be glad to assist.<br \/>\n<\/div>\n<\/div>\n\n<h2>Getting Started<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/crowdstrike-installation\/\">Download and install CrowdStrike<\/a><\/li>\n<li>Start with our <a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/removal\/security\/safe-computing\/\">Safe Computing<\/a> page.<\/li>\n<li>Learn how to <a href=\"http:\/\/www.bu.edu\/police\/crime-prevention\/laptop-registration-with-stop\/\">register<\/a> your notebook with the BU Police.<\/li>\n<\/ul>\n<\/div>\n<p><!-- end div id=bbvista8 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; IS&amp;T offers site licensed software, information, and support for securing your computer and protecting it from viruses, spyware, and other malicious behavior. You can keep your computer running safely by installing this next-gen endpoint protection software and making appropriate security and update settings, as documented on our support pages. Should your computer become infected&#8230;<\/p>\n","protected":false},"author":2674,"featured_media":0,"parent":87855,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/126522"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/2674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=126522"}],"version-history":[{"count":43,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/126522\/revisions"}],"predecessor-version":[{"id":145470,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/126522\/revisions\/145470"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/87855"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=126522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}