While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it's probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major endpoint players do a fairly good job at detecting traditional virus attacks. But more importantly, endpoints aren’t only about antivirus anymore.
Endpoint protection uses tools like behavioral analysis, host-based intrusion prevention systems (HIPS), patch and configuration management, whitelisting, network access control and data loss prevention. Increasingly, these tools are deployed as part of a single-vendor suite, which, on the one hand, narrows the field, but on the other makes it difficult to make meaningful side-by-side comparisons. In this series, we take an independent look at the options in order to help you focus on your particular priorities, consider product and solution features that can help implement endpoint security and close with advice on how to make the final buying decision.
Chapters Available For Free Access
Learn how endpoint protection software can help block malicious network traffic while providing secure access to your data.
Learn the different options of endpoint protection software and how each feature helps to detect and stop malicious behavior.
Learn how to evaluate your potential endpoint solution and its ability to integrate into your environment.
Tips and Tutorials
- Introduction to Information Security: A Strategic-Based Approach
- Snort OpenAppID introduction: Open source application control
- Unified Communications Forensics: Anatomy of Common UC Attacks
- Continuous security monitoring: What enterprises can learn from CDM
- Best of intrusion detection and prevention 2013
- Cisco security strategy update: Cisco adds Sourcefire AMP to gateways
- Marty Roesch pushes collective analysis, underscores cyberthreat intelligence
- Snort creator remains guiding force behind network detection system
- Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
- Network forensics tools increasingly aid security response teams
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...