{"id":345,"date":"2022-08-04T17:59:54","date_gmt":"2022-08-04T10:59:54","guid":{"rendered":"https:\/\/ics.co.id\/?page_id=345"},"modified":"2022-08-11T09:16:37","modified_gmt":"2022-08-11T02:16:37","slug":"end-point","status":"publish","type":"page","link":"https:\/\/ics.co.id\/?page_id=345","title":{"rendered":"End point"},"content":{"rendered":"\n<p class=\"has-vivid-cyan-blue-color has-text-color has-large-font-size\">98% of threats enter through email.<\/p>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-cover is-light\" style=\"min-height:375px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#f6f6f6\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?resize=583%2C299&#038;ssl=1\" alt=\"\" class=\"wp-image-352\" width=\"583\" height=\"299\" srcset=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?resize=1024%2C527&amp;ssl=1 1024w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?resize=300%2C154&amp;ssl=1 300w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?resize=768%2C395&amp;ssl=1 768w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?w=1193&amp;ssl=1 1193w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\" \/><\/figure>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:1em;padding-right:1em;padding-bottom:1em;padding-left:1em\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:320px\">\n<p class=\"has-small-font-size\" style=\"line-height:1.6\"><strong>Top threat is Malware<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\" style=\"line-height:1.6\"><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>CylancePROTECT\u00ae is an AI-based Endpoint Protection Platform (EPP) that blocks cyberattacks and provides controls for safeguarding against sophisticated threats\u2014no human intervention, Internet connections, signature files, heuristics, or sandboxes required.<\/p>\n\n\n\n<p>CylancePROTECT\u00ae Protect for Mobile too.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background\"\/>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-cover is-light\" style=\"min-height:600px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#f6f6f6\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"964\" height=\"843\" src=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Cylance_feature.jpg?resize=964%2C843&#038;ssl=1\" alt=\"\" class=\"wp-image-354\" srcset=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Cylance_feature.jpg?w=964&amp;ssl=1 964w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Cylance_feature.jpg?resize=300%2C262&amp;ssl=1 300w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Cylance_feature.jpg?resize=768%2C672&amp;ssl=1 768w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/figure>\n<\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:1em;padding-right:1em;padding-bottom:1em;padding-left:1em\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:320px\">\n<p class=\"has-small-font-size\" style=\"line-height:1.6\"><strong>Cylance PROTECT features<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\" style=\"line-height:1.6\"><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>True Zero_Day Prevention<\/li><li>AI-Driven Malware Prevention<\/li><li>Script Management<\/li><li>Device Usage Policy Enforcement<\/li><li>Memory Exploitation Detection and Prevention<\/li><li>Application Control for Fixed-Function Devices<\/li><\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:24% auto\"><figure class=\"wp-block-media-text__media\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"349\" src=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/d10736-50-388273-0.jpg?resize=525%2C349&#038;ssl=1\" alt=\"\" class=\"wp-image-322 size-full\" srcset=\"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/d10736-50-388273-0.jpg?w=525&amp;ssl=1 525w, https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/d10736-50-388273-0.jpg?resize=300%2C199&amp;ssl=1 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-vivid-cyan-blue-color has-text-color has-large-font-size\">CylancePROTECT\u00ae provides full-spectrum threat prevention that stops endpoint breaches by solving the following use cases:<\/p>\n\n\n\n<p>\u2022 Identify security vulnerabilities and potential malicious activities by monitoring OS updates, system parameters, device configurations, and system libraries<br>\u2022 Control where, how, and who can execute scripts<br>\u2022 Manage USB device usage and prevent unauthorized devices from being used<br>\u2022 Stop fileless malware attacks<br>\u2022 Lock down fixed-function devices such as kiosks, POS terminals, etc.<br>\u2022 Prevent zero-day and ransomware attacks<br>\u2022 Stop memory-based attacks and exploitations<br>\u2022 Use application sandboxing and code analysis as well as app-security testing to identify malware and grayware<br>\u2022 Identify any malware that might come in through sideloaded applications, unique signature-based malware, or simulations<br>\u2022 Protection for endpoints when users are online or offline<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-light-green-cyan-color has-text-color has-huge-font-size\"><a href=\"https:\/\/ics.co.id\/?page_id=7\">Contact us for a quote<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>98% of threats enter through email. Top threat is Malware CylancePROTECT\u00ae is an AI-based Endpoint Protection Platform (EPP) that blocks cyberattacks and provides controls for safeguarding against sophisticated threats\u2014no human intervention, Internet connections, signature files, heuristics, or sandboxes required. CylancePROTECT\u00ae Protect for Mobile too. Cylance PROTECT features True Zero_Day Prevention AI-Driven Malware Prevention Script Management [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_lightning_design_setting":{"layout":"default"},"footnotes":""},"class_list":["post-345","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>End point - PT.INDONUSA COMPUTER SYSTEM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ics.co.id\/?page_id=345\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"End point - PT.INDONUSA COMPUTER SYSTEM\" \/>\n<meta property=\"og:description\" content=\"98% of threats enter through email. Top threat is Malware CylancePROTECT\u00ae is an AI-based Endpoint Protection Platform (EPP) that blocks cyberattacks and provides controls for safeguarding against sophisticated threats\u2014no human intervention, Internet connections, signature files, heuristics, or sandboxes required. CylancePROTECT\u00ae Protect for Mobile too. Cylance PROTECT features True Zero_Day Prevention AI-Driven Malware Prevention Script Management [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ics.co.id\/?page_id=345\" \/>\n<meta property=\"og:site_name\" content=\"PT.INDONUSA COMPUTER SYSTEM\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-11T02:16:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat-1024x527.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345\",\"url\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345\",\"name\":\"End point - PT.INDONUSA COMPUTER SYSTEM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ics.co.id\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Graph_cyber_threat-1024x527.jpg\",\"datePublished\":\"2022-08-04T10:59:54+00:00\",\"dateModified\":\"2022-08-11T02:16:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ics.co.id\\\/?page_id=345\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ics.co.id\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Graph_cyber_threat.jpg?fit=1193%2C614&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ics.co.id\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Graph_cyber_threat.jpg?fit=1193%2C614&ssl=1\",\"width\":1193,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/?page_id=345#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ics.co.id\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"End point\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/#website\",\"url\":\"https:\\\/\\\/ics.co.id\\\/\",\"name\":\"PT.INDONUSA COMPUTER SYSTEM\",\"description\":\"System integration and quality support\",\"publisher\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ics.co.id\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/#organization\",\"name\":\"PT.INDONUSA COMPUTER SYSTEM\",\"url\":\"https:\\\/\\\/ics.co.id\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ics.co.id\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ics.co.id\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/ICSLOGO.png\",\"contentUrl\":\"https:\\\/\\\/ics.co.id\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/ICSLOGO.png\",\"width\":399,\"height\":210,\"caption\":\"PT.INDONUSA COMPUTER SYSTEM\"},\"image\":{\"@id\":\"https:\\\/\\\/ics.co.id\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/72607241\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"End point - PT.INDONUSA COMPUTER SYSTEM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ics.co.id\/?page_id=345","og_locale":"en_US","og_type":"article","og_title":"End point - PT.INDONUSA COMPUTER SYSTEM","og_description":"98% of threats enter through email. Top threat is Malware CylancePROTECT\u00ae is an AI-based Endpoint Protection Platform (EPP) that blocks cyberattacks and provides controls for safeguarding against sophisticated threats\u2014no human intervention, Internet connections, signature files, heuristics, or sandboxes required. CylancePROTECT\u00ae Protect for Mobile too. Cylance PROTECT features True Zero_Day Prevention AI-Driven Malware Prevention Script Management [&hellip;]","og_url":"https:\/\/ics.co.id\/?page_id=345","og_site_name":"PT.INDONUSA COMPUTER SYSTEM","article_modified_time":"2022-08-11T02:16:37+00:00","og_image":[{"url":"https:\/\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat-1024x527.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ics.co.id\/?page_id=345","url":"https:\/\/ics.co.id\/?page_id=345","name":"End point - PT.INDONUSA COMPUTER SYSTEM","isPartOf":{"@id":"https:\/\/ics.co.id\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ics.co.id\/?page_id=345#primaryimage"},"image":{"@id":"https:\/\/ics.co.id\/?page_id=345#primaryimage"},"thumbnailUrl":"https:\/\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat-1024x527.jpg","datePublished":"2022-08-04T10:59:54+00:00","dateModified":"2022-08-11T02:16:37+00:00","breadcrumb":{"@id":"https:\/\/ics.co.id\/?page_id=345#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ics.co.id\/?page_id=345"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ics.co.id\/?page_id=345#primaryimage","url":"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?fit=1193%2C614&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ics.co.id\/wp-content\/uploads\/2022\/08\/Graph_cyber_threat.jpg?fit=1193%2C614&ssl=1","width":1193,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/ics.co.id\/?page_id=345#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ics.co.id\/"},{"@type":"ListItem","position":2,"name":"End point"}]},{"@type":"WebSite","@id":"https:\/\/ics.co.id\/#website","url":"https:\/\/ics.co.id\/","name":"PT.INDONUSA COMPUTER SYSTEM","description":"System integration and quality support","publisher":{"@id":"https:\/\/ics.co.id\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ics.co.id\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ics.co.id\/#organization","name":"PT.INDONUSA COMPUTER SYSTEM","url":"https:\/\/ics.co.id\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ics.co.id\/#\/schema\/logo\/image\/","url":"https:\/\/ics.co.id\/wp-content\/uploads\/2021\/09\/ICSLOGO.png","contentUrl":"https:\/\/ics.co.id\/wp-content\/uploads\/2021\/09\/ICSLOGO.png","width":399,"height":210,"caption":"PT.INDONUSA COMPUTER SYSTEM"},"image":{"@id":"https:\/\/ics.co.id\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/72607241\/"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/pages\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ics.co.id\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=345"}],"version-history":[{"count":4,"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/pages\/345\/revisions"}],"predecessor-version":[{"id":400,"href":"https:\/\/ics.co.id\/index.php?rest_route=\/wp\/v2\/pages\/345\/revisions\/400"}],"wp:attachment":[{"href":"https:\/\/ics.co.id\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}