Endpoint - Article Archives - Page 1

AlertSec Aims to Make Encryption Security More Accessible

|

VIDEO: Ebba Blitz, CEO of AlertSec, details what her security company is all about and why encryption on its own isn't enough to keep consumers safe.

READ MORE

Comodo Sets cWatch EDR 'Free'

|

The company makes its cWatch endpoint detection and response product available to businesses at no cost.

READ MORE

Top 10 Endpoint Detection and Response (EDR) Solutions

|

Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors to consider.

READ MORE

CounterTack Endpoint Threat: EDR Product Overview and Insight

|

We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.

READ MORE

CrowdStrike Falcon Insight: EDR Product Overview and Insight

|

We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

READ MORE

Tanium: EDR Product Overview and Insight

|

We review Tanium's EDR solution, which can scale to millions of endpoints with requiring additional infrastructure.

READ MORE

Cisco AMP for Endpoints: EDR Product Overview and Insight

|

We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.

READ MORE

RSA NetWitness Endpoint: EDR Product Overview and Insight

|

We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.

READ MORE

Symantec Endpoint Protection: EDR Product Overview and Insight

|

We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.

READ MORE

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

|

We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.

READ MORE

Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

|

We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.

READ MORE

Carbon Black Cb Response: EDR Product Overview and Insight

|

We review Carbon Black Cb Response, an EDR solution that boasts a CIA and NSA cybersecurity pedigree and supports 150,000 endpoints per cluster with unlimited scalability.

READ MORE

FireEye Endpoint Security: EDR Product Overview and Insight

|

We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.

READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

|

Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.

READ MORE

Mobile Malware: What It Is and How to Stop It

|

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

Encryption: Securing Sensitive Data in Changing Corporate Environments

|

As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from encryption basics to solutions.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

|

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

|

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

|

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

|

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|