Endpoint - Article Archives - Page 2

RSA NetWitness Endpoint: EDR Product Overview and Insight

June 22, 2017 |

We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.

READ MORE

Symantec Endpoint Protection: EDR Product Overview and Insight

June 22, 2017 |

We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.

READ MORE

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

June 22, 2017 |

We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.

READ MORE

Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

June 22, 2017 |

We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.

READ MORE

Carbon Black Cb Response: EDR Product Overview and Insight

June 22, 2017 |

We review Carbon Black Cb Response, an EDR solution that boasts a CIA and NSA cybersecurity pedigree and supports 150,000 endpoints per cluster with unlimited scalability.

READ MORE

FireEye Endpoint Security: EDR Product Overview and Insight

June 22, 2017 |

We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.

READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

June 08, 2017 |

Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.

READ MORE

Mobile Malware: What It Is and How to Stop It

May 09, 2017 |

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

Encryption: Securing Sensitive Data in Changing Corporate Environments

May 05, 2017 |

As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from encryption basics to solutions.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

April 05, 2017 |

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BYOD Security: Understanding Bring Your Own Device Security Risks

April 05, 2017 |

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

Different Types of Malware and How to Defend Against Them

April 04, 2017 |

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

March 28, 2017 |

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Patch Management: How to Update Software on Your Network Securely

March 27, 2017 |

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE

Network Access Control: Restricting and Monitoring Access to Your Network and Data

March 24, 2017 |

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017 |

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

READ MORE

Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

March 20, 2017 |

Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.

READ MORE