dcsimg

Endpoint - Article Archives - Page 3

Symantec to Acquire Web Threat Isolation Startup Fireglass

July 06, 2017 |

The company is buying the New York City startup to help protect users from malicious websites.

READ MORE

63 Percent of Companies Can't Monitor Devices Off the Corporate Network

June 29, 2017 |

And 53 percent of security pros say the number of malware-infected endpoints has increased in the past year, a recent survey found.

READ MORE

AlertSec Aims to Make Encryption Security More Accessible

June 28, 2017 |

VIDEO: Ebba Blitz, CEO of AlertSec, details what her security company is all about and why encryption on its own isn't enough to keep consumers safe.

READ MORE

Comodo Sets cWatch EDR 'Free'

June 26, 2017 |

The company makes its cWatch endpoint detection and response product available to businesses at no cost.

READ MORE

Top 10 Endpoint Detection and Response (EDR) Solutions

June 22, 2017 |

Endpoint Detection and Response (EDR) solutions offer continuous monitoring and response to advanced security threats. Here are the top EDR vendors to consider.

READ MORE

CounterTack Endpoint Threat: EDR Product Overview and Insight

June 22, 2017 |

We review CounterTack's Endpoint Threat Platform, an EDR solution that can perform billions of scans per second and uses behavioral analysis, machine learning and reputational techniques to counter threats.

READ MORE

CrowdStrike Falcon Insight: EDR Product Overview and Insight

June 22, 2017 |

We review CrowdStrike Falcon Insight, a cloud-based EDR platform that analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries.

READ MORE

Tanium: EDR Product Overview and Insight

June 22, 2017 |

We review Tanium's EDR solution, which can scale to millions of endpoints with requiring additional infrastructure.

READ MORE

Cisco AMP for Endpoints: EDR Product Overview and Insight

June 22, 2017 |

We review Cisco AMP for Endpoints, an EDR solution with a 100% score from NSS Labs for malware and exploit detection and the ability to block 20 billion threats a day.

READ MORE

RSA NetWitness Endpoint: EDR Product Overview and Insight

June 22, 2017 |

We review RSA NetWitness Endpoint, an EDR solution that uses behavior analytics, machine learning and threat intelligence to detect and prioritize threats.

READ MORE

Symantec Endpoint Protection: EDR Product Overview and Insight

June 22, 2017 |

We review Symantec Endpoint Protection with EDR, which can scale to hundreds of thousands of nodes and is supported by the world's largest threat intelligence network.

READ MORE

Cybereason Total Enterprise Protection: EDR Product Overview and Insight

June 22, 2017 |

We review Cybereason Total Enterprise Protection, an EDR solution for companies of any size with little IT security expertise. It has unlimited scalability and can process 8 million questions a second.

READ MORE

Guidance Software EnCase Endpoint Security: EDR Product Overview and Insight

June 22, 2017 |

We review Guidance Software EnCase Endpoint Security, an EDR solution that can scale to hundreds of thousands of nodes and can secure ATMs, POS systems and manufacturing devices.

READ MORE

Carbon Black Cb Response: EDR Product Overview and Insight

June 22, 2017 |

We review Carbon Black Cb Response, an EDR solution that boasts a CIA and NSA cybersecurity pedigree and supports 150,000 endpoints per cluster with unlimited scalability.

READ MORE

FireEye Endpoint Security: EDR Product Overview and Insight

June 22, 2017 |

We review FireEye Endpoint Security, an EDR solution for organizations with 250 to 350,000 endpoints, with a cloud option for smaller companies.

READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

June 08, 2017 |

Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.

READ MORE

Mobile Malware: What It Is and How to Stop It

May 09, 2017 |

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

Encryption: Securing Sensitive Data in Changing Corporate Environments

May 05, 2017 |

As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from encryption basics to solutions.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE