ENDPOINT SECURITY

Endpoints – the smartphones, laptops, desktops and other devices that connect to enterprise networks – are among the biggest IT security threats. Our endpoint security coverage keeps you informed of the latest threats to your organization, from phishing to ransomware, and gives you what you need to fight those threats, from best practices to the latest security solutions.

LATEST ENDPOINT SECURITY ARTICLES

Mobile Malware: What It Is and How to Stop It

|

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

Encryption: Securing Sensitive Data in Changing Corporate Environments

|

As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from encryption basics to solutions.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

|

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

|

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

|

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

TOP ENDPOINT SECURITY RESOURCES

IOT SECURITY

Learn what smart enterprises can do to secure their IoT deployments.

READ MORE

The Future of Firefox Security

New efforts in 2012 could make the open source browser even more secure.

READ MORE

Exploiting Security Devices? Oh, the Irony

Enterprises spend millions every year on security appliances intended to secure their networks. Yet many of those devices are themselves not secure.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

|

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE
BYOD: Understanding Bring Your Own Device Security Risks

BYOD: Understanding Bring Your Own Device Security Risks

|

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE
Different Types of Malware and How to Defend Against Them

Different Types of Malware and How to Defend Against Them

|

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE
CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

|

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE