Endpoint Protection

Endpoint Protection and Security

protection privacy locks security cybersecurity
hacker endpoint security vulnerability cyberattack lock

porting converting magic change

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

Movie preview test pattern

Best security software: How cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

network security digital internet firewall binary code

The future of AI and endpoint security

Endpoints are the weakest link in your enterprise security chain. Is AI the solution?

network security digital internet firewall binary code

Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.

Unified Endpoint Management

Enterprise endpoint protection failures will continue until accountability increases

To make better choices, we must help enterprise stakeholders understand the conflicts of interest among the cyber players that present or influence their choices.

Security Shield

CISOs should examine commercial SOAPA offerings in 2018

Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

pc antivirus

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, antivirus tools still play an important role in the enterprise security strategy.

crystal ball

A few cybersecurity predictions for 2018

Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.

firewall

Redefining perimeter network security: The future is a hybrid

As information pushes further into the cloud, the role of perimeter security is changing. It will become part of a multifaceted solution for network security.

ransomware hack

2018: The year of advanced threat prevention

In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.

cybersecurity ts

The cybersecurity skills shortage acts as a root cause for security events

New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.

Malware virus

Malwarebytes is tracking missed detections in traditional antivirus

Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren't cutting it. The company examined detection data from nearly 10 million endpoints, and...

managed security service providers

Endpoint security needs 'efficient efficacy'

Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.

abstract circuitry with padlock for security

The push toward comprehensive endpoint security suites

Traditional and next-generation vendors offer suites for endpoint protection, detection and response. But what’s needed, and will customers buy?

writing description sign document security

How enterprise organizations benefit from SOAPA

Security operations and analytics platform architecture could accelerate technology innovation, ease integration, and enhance the value of existing technologies.

Load More