Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

endpoint protection gears

Endpoint security suites must detect/prevent threats AND ease operations

Organizations want better threat prevention/detection, but only if new endpoint security tools can help automate and simplify operations, too.

mousetrap cheese

Review: The enSilo platform traps threats that bypass traditional endpoint defenses

The enSilo platform offers traditional endpoint protection alongside the ability to offer post-infection protection. It can also trap threats, holding them in place and rendering them harmless until a threat hunter can arrive to...

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

protection privacy locks security cybersecurity

Endpoint security suites must have these features

Endpoint security vendors must be a one-stop endpoint security shop -- providing such things as anti-malware, anti-exploit, EDR and hybrid deployment options -- if they want to compete.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

porting converting magic change

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

binary cyberattack cybersecurity hacked protected

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren’t sure how to consume it.

network security digital internet firewall binary code

The future of AI and endpoint security

Endpoints are the weakest link in your enterprise security chain. Is AI the solution?

network security digital internet firewall binary code

Endpoint security as a service will grow in 2018

Organizations want help with endpoint security areas, including data loss prevention, enterprise risk management, and threat hunting.

Unified Endpoint Management

Enterprise endpoint protection failures will continue until accountability increases

To make better choices, we must help enterprise stakeholders understand the conflicts of interest among the cyber players that present or influence their choices.

Security Shield

CISOs should examine commercial SOAPA offerings in 2018

Leading vendors are putting together proprietary SOAPA solutions. CISOs should establish an evaluation team tasked with looking for viable options.

endpoint protection

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem.

crystal ball

A few cybersecurity predictions for 2018

Look for cloud computing chaos, high-end services, technology consolidation/integration, machine learning ubiquity, and a GDPR mess.

firewall

Redefining perimeter network security: The future is a hybrid

As information pushes further into the cloud, the role of perimeter security is changing. It will become part of a multifaceted solution for network security.

ransomware hack

2018: The year of advanced threat prevention

In 2018, leading organizations will adopt new technologies to help them decrease the attack surface and block attacks in real time.

cybersecurity ts

The cybersecurity skills shortage acts as a root cause for security events

New research from ESG and ISSA reveals that a lack of training, inadequate cybersecurity staffing, and business apathy contribute to security events.

Malware virus

Malwarebytes is tracking missed detections in traditional antivirus

Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren't cutting it. The company examined detection data from nearly 10 million endpoints, and...

managed security service providers

Endpoint security needs 'efficient efficacy'

Enterprise organizations want new endpoint security tools that prevent exploits and malware better and streamline operations.

abstract circuitry with padlock for security

The push toward comprehensive endpoint security suites

Traditional and next-generation vendors offer suites for endpoint protection, detection and response. But what’s needed, and will customers buy?

Load More