New & Notable
Client security News
July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
March 21, 2014
Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.
January 16, 2014
Software giant Microsoft will extend Windows XP antivirus updates past the XP end-of-life date, but security patches are still slated to end in April.
September 20, 2013
HP's new SureStart feature detects and 'heals' corrupted BIOS code.
Client security Get Started
Bring yourself up to speed with our introductory content
Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Continue Reading
The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet. Continue Reading
A shadow app is a software program that is not supported by an employee's information technology (IT) department. Continue Reading
Evaluate Client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers vote on the best endpoint security products of 2014. Continue Reading
Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. Continue Reading
Does the combination of the Trusted Platform Module and Windows 8 create the threat of a backdoor? Michael Cobb discusses. Continue Reading
Manage Client security
Learn to apply best practices and optimize your operations.
Many security technologies have been developed to help organizations secure application use on endpoints, yet few have achieved their goal.
When application control first became important to the market, it seemed endpoint application ... Continue Reading
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ignored. The web of interconnected devices promises both enormous benefits to users and serious ... Continue Reading
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
Problem Solve Client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security. Continue Reading
Expert Brad Casey offers a number of best practices to help your organization ensure network and endpoint security in a BYOPC era. Continue Reading
Expert Brad Casey details how advanced malware detection products rely heavily on sandboxing technology, though it's not a cure all for enterprises. Continue Reading