We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.
We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.
We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.
We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.
We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.
We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.
We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.
We review Carbon Black Cb Response, an EDR solution that boasts a CIA and NSA cybersecurity pedigree and supports 150,000 endpoints per cluster with unlimited scalability.
We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.
The company releases new tools to help organizations ensure that their Kubernetes 1.6 container orchestration deployments meet the Center for Internet Security's benchmarks.
The same is true of 15 percent of computers in finance, healthcare and retail.
The company offers healthcare organizations free access to its IoT Guardian security solution in the wake of WannaCry.
1.1 terabytes of data was left publicly accessible in an unprotected database.
Security firm Qualys discovers flaws in the Linux kernel and glibc library, that fortunately have not been exploited in the wild by attackers - yet
Still, just 44 percent say they're able to protect their systems from risky IoT devices.
The company launches a private beta of its security solution for WordPress databases.