Client security News
February 09, 2017
Druva inSync software is upgraded with tools to detect ransomware attacks and helps recover clean data. The endpoint software detects strange data behavior patterns.
August 19, 2016
Dell's Brett Hansen explains why machine learning security is better than signature-based detection and how it can stop emerging threats.
April 01, 2016
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.
January 29, 2016
Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works.
Client security Get Started
Bring yourself up to speed with our introductory content
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data. Continue Reading
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading
A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded. Burners are purchased with prepaid minutes and without a contract. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Big data tools and technologies can contribute to your enterprise's overall security, but they also require protection. Find out the controls your enterprise can implement. Continue Reading
Finding the best endpoint security for your enterprise is a complex, ever-changing task. Learn what features tools offer now to protect endpoints touching the enterprise systems. Continue Reading
Discoveries of vulnerabilities in antivirus tools, such as Symantec Antivirus, have put their abilities into question. Expert Nick Lewis explains how it affects enterprises. Continue Reading
Manage Client security
Learn to apply best practices and optimize your operations.
At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer ... Continue Reading
Organizations that choose to tackle the long list of internet of things challenges know that security-related issues must be at the top of that list: A plunge into the world of smart, connected devices inevitably comes with a whole set of security ... Continue Reading
Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these ... Continue Reading
Problem Solve Client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
Does the combination of the Trusted Platform Module and Windows 8 create the threat of a backdoor? Michael Cobb discusses. Continue Reading