ENDPOINT SECURITY

Endpoints – the smartphones, laptops, desktops and other devices that connect to enterprise networks – are among the biggest IT security threats. Our endpoint security coverage keeps you informed of the latest threats to your organization, from phishing to ransomware, and gives you what you need to fight those threats, from best practices to the latest security solutions.

LATEST ENDPOINT SECURITY ARTICLES

Ethereum Blockchain Powers Vault One Password Service

|

Ethereum isn't just for cryptocurrency anymore as a new startup uses the underlying open-source blockchain to help improve password security.

READ MORE

Top 10 Enterprise Encryption Products

|

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

READ MORE

19 Top UEBA Vendors

|

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We review the top UEBA products.

READ MORE

Kaspersky Lab Defends Its Reputation Against Allegations

|

Russian security firm shoots back at critics that allege inappropriate ties with Putin government.

READ MORE

Microsoft Patches 19 Critical Vulnerabilities in July Patch Tuesday Update

|

A total of 54 flaws in total are now patched, including a critical issue in the HoloLens VR technology.

READ MORE

TOP ENDPOINT SECURITY RESOURCES

ENDPOINT DETECTION AND RESPONSE (EDR)

Learn how to prevent threats on devices connected to your network.

READ MORE

Top Endpoint Detection and Response Solutions

Learn about 10 of the top EDR vendors to find out which one is right for your business.

READ MORE

DATA LOSS PREVENTION

Everything you need to know about data loss prevention technology and products.

READ MORE

ENCRYPTION

How to secure sensitive data in changing corporate environments.

READ MORE

PATCH MANAGEMENT

Find out everything you need to know to implement an effective patch management software system.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
VPN Security: How VPNs Work and How to Buy the Best One

VPN Security: How VPNs Work and How to Buy the Best One

|

Virtual private networks (VPNs) come with many different protocols and features, so choosing the best one for your organization requires some research. We outline your options.

READ MORE
BYOD Blamed for Massive Cryptocurrency Breach

BYOD Blamed for Massive Cryptocurrency Breach

|

30,000 customers' information was exposed when an employee's home computer was hacked.

READ MORE
Symantec to Acquire Web Threat Isolation Startup Fireglass

Symantec to Acquire Web Threat Isolation Startup Fireglass

|

The company is buying the New York City startup to help protect users from malicious websites.

READ MORE
63 Percent of Companies Can't Monitor Devices Off the Corporate Network

63 Percent of Companies Can't Monitor Devices Off the Corporate Network

|

And 53 percent of security pros say the number of malware-infected endpoints has increased in the past year, a recent survey found.

READ MORE