Endpoint Protection

Endpoint Protection and Security

security risks in the IoT [internet of things] network
honey jar honeypot

mobile connection endpoint protection

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as...

binary cyberattack cybersecurity hacked protected

What is a cybersecurity technology platform anyway?

Vendors are pushing platforms, but features, functionality, and definitions vary. Here’s a list of “must have” cybersecurity platform attributes.

Movie preview test pattern
Update

Best security software: How 9 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

pc antivirus

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, antivirus tools still play an important role in the enterprise security strategy.

group silhouette filled with binary code

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

allscripts insider pdf primary

Allscripts: Ransomware, recovery, and frustrated customers

The actors behind SamSam launched an attack against Allscripts in January 2018, leaving the company’s customers without access to the services needed to run their medical practices — some for more than a week.

green army soldier on a laptop keyboard

For endpoint security, trust but verify

Your organization might eventually fall victim to a data breach but creating checks and balances to maintain a layered data security approach can help you come out the other side with fewer losses.

Unified Endpoint Management

Is it time to unify endpoint management and security?

Modern unified management makes sense, and the industry is reacting by providing solutions. The question is whether enterprise organizations will use them.

endpoint protection gears

Endpoint security suites must detect/prevent threats AND ease operations

Organizations want better threat prevention/detection, but only if new endpoint security tools can help automate and simplify operations, too.

mousetrap cheese

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

protection privacy locks security cybersecurity

Endpoint security suites must have these features

Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

porting converting magic change

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

network security digital internet firewall binary code

The future of AI and endpoint security

Endpoints are the weakest link in your enterprise security chain. Is AI the solution?

network security digital internet firewall binary code

Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.

Load More