After antimalware: Managing the move to what's next

Client security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Enterprise network security visibility: Beyond traditional defenses

    Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... 

  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Cloud initiatives are changing roles for information security managers

    This edition features the results of our 2011 priorities survey. Today's information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects. Plus, learn from the experts about the best ways to enforce ... 

  • Combatting the new security threats of today's mobile devices

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subje... 

  • Comparing seven top integrated endpoint security suites

    A colorful array of seven complex integrated endpoint security suites is put to the test. See which fared best. Also in this issue, learn more about revamping remote access, getting to know honeyclients and winning the Web 2.0 tug-of-war. 

  • Examining device-based authentication

    Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear. 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. 

  • email spoofing

    E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. 

  • phishing

    Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. 

  • social engineering

    Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. 

  • Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usua... 

  • brute force cracking

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than emp... 

  • Crash Course: Spyware

    In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge. 

  • Malware detection and prevention fundamentals

    Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware. 

  • Revitalizing endpoint security with VDI desktops

    Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren. 

  • Inside the NSA trusted computing strategy

    The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers. 

  • Jaquith on Forrester's endpoint security management Zero Trust Model

    At Forrester Research Inc.'s Security Forum 2010 in Boston, Andrew Jaquith, senior analyst with Forrester, spoke with SearchSecurity.com about the research firm's Zero Trust Model for endpoint security. 

  • Perimeter defense in the era of the perimeterless network

    When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for en... 

  • Top tactics for endpoint security

    The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak o... 

  • Enterprise endpoint security fundamentals

    Video: Mike Chapple offers a "back to basics" look at enterprise endpoint security to identify the crucial components of an endpoint security program. 

  • Discussing security operations: Security 7 awards video

    The industry's best and brightest security officers discuss key issues and answer questions during the Security 7 awards at the 2007 Information Security Decisions conference. 

  • NAC and endpoint security: The hard questions

    Joel Snyder covers challenging endpoint security questions and explains how NAC technology can address them. 

  • Smart tactics for antivirus and antispyware

    AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural perspective. You'll learn the benefits of standalone prod... 

About Client security

Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other endpoint machines.