UncommonX Blog

Learn how UncommonX solutions are making a major impact on the industry and our customers. Don’t forget to subscibe to our X Factor Files newsletter to receive the latest news and updates.

Subscribe →

5 min read

Ransomware and Endpoint Devices

What does ransomware do to an endpoint device? What does ransomware do to an endpoint device? Ransomware attacks have been increasing in number and severity lately — and without awareness of the issue, the problem will only get worse.

Read More

3 min read

Does EDR prevent ransomware attacks?

Wondering if EDR can stop ransomware? Endpoint detection and response (EDR) software is an endpoint security solution that helps guard against...

Read More

2 min read

Case Study: Using Continuous Threat Exposure Management to Address Zero-Day Vulnerabilities

Security and risk management leaders can use this study to see how New York State Insurance Fund (NYSIF) utilized a CTEM program to minimize the...

Read More

3 min read

Breaking down the difference: EDR VS. XDR

Enterprise data protection can be a complex undertaking, and there are a variety of approaches that organizations can take to secure their data. One...

Read More

4 min read

The Cost of Building a 24/7 Security Operations Center

Millions of dollars are wasted each year when a company does not have a security operations center (SOC) to protect and secure its data and the days...

Read More
Man using an endpoint device

5 min read

Endpoint Protection and Ransomware

What is the correlation? What does ransomware do to an endpoint device? Ransomware attacks have been increasing in number and severity lately — and...

Read More

3 min read

MDR, EDR, XDR Broken Down: Stop with the Acronyms!

MDR, EDR, XDR Broken Down Enterprise data protection can be a complex undertaking, and there are a variety of approaches that organizations can take...

Read More