Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

mobile security threat detection
Movie preview test pattern

endpoint protection gears

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.

pc antivirus

Best antivirus software: 9 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

6 antivirus

What your antivirus software doesn’t tell you, and how to get that data

Antivirus software detects and removes malware, but how fast and how accurate? Here's no-cost way to find out and hold antivirus vendors accountable.

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

Cloud Security

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns.

tools / toolkit

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

The 7 deadly sins of endpoint detection & response

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

10 cloud security breach virtualization wireless

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

cyber security lock padlock firewall code breach password

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

binary chains / linked data / security / blockchain

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

green army soldier on a laptop keyboard

Review: Protecting endpoints with SentinelOne’s all-powerful agents

Having powerful, protected, and independent agents sitting on endpoints gives SentinelOne a huge advantage against today's increasingly sophisticated attacks.

eye security privacy time clocks deadline

Threat detection: it’s about ‘time’

Incident response is a slave to time. From time-to-detection through time-to-containment, time is the crucial factor when responding to any threat.

threat detection

EDR is dead! Long live XDR!

Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

digital security concept > lock / keyhole / circuits / network connections

The transition toward enterprise-class cybersecurity vendors

Information security professionals working at enterprise organizations want to work with vendors that have experience with business/IT initiatives and industry knowledge.

smart city - IoT internet of things - wireless network

Review: Monitoring IT, OT and IoT devices with ForeScout

ForeScout is one of a very few programs that can help to track and manage operational technology and IoT devices alongside of information technology. Everything from lighting controllers to HVAC units can be discovered and managed.

Load More
You Might Also Like