Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

A robotic hand activates/manages a network of integrated security.
computer crime scene / hacked / infected / cybercrime / cyberattack

three global network puzzle pieces

3 XDR market challenges

XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.

A woman works from home with an abstract binary overlay in the surrounding environment.

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

Whitelisting explained: How it works and where it fits in a security program

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it...

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

integration / exchange / unification / cohesion / unified blocks

10 things you should know about XDR

An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

Activating a protective virtual shield amid COVID-19 coronavirus morphology

4 tips for protecting users from COVID-19-targeted attacks

Remote users in particular are vulnerable to coronavirus-themed phishing attempts, malicious domains, and repurposed malware. Protect them with these basic steps.

broken lock amid binary code and circuits

Is enterprise security broken?

Deploying independent endpoint or network security separately is coming to a rapid – and much-needed -- end. If you want to stay secure longer-term, focus on unifying your security products now.

cybersecurity  >  information security / data protection / lock / shield / layers of integration

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

A glowing light bulb stands out from a crowd of unlit bulbs. [ideas / innovation / transformation]

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

FireMon network security policy management
Updated

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

CSO > colleagues writing on a glass wall / collaboration / teamwork

Peer product reviews: IT pros evaluate 7 enterprises offerings

These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...

Linux security shield

Top Linux antivirus software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection.

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

Load More
You Might Also Like