Endpoint protection and client security News
February 09, 2017
Druva inSync software is upgraded with tools to detect ransomware attacks and helps recover clean data. The endpoint software detects strange data behavior patterns.
August 19, 2016
Dell's Brett Hansen explains why machine learning security is better than signature-based detection and how it can stop emerging threats.
April 01, 2016
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints.
January 29, 2016
Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Continue Reading
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Using threat intelligence tools can help your enterprise stay one step ahead of attackers and possible threats. Learn how threat intelligence can be used in your company. Continue Reading
Threat intelligence technology can analyze data to forecast future attacks and provide actionable countermeasures. Learn if it is suitable for your enterprise. Continue Reading
Big data tools and technologies can contribute to your enterprise's overall security, but they also require protection. Find out the controls your enterprise can implement. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer ... Continue Reading
Organizations that choose to tackle the long list of internet of things challenges know that security-related issues must be at the top of that list: A plunge into the world of smart, connected devices inevitably comes with a whole set of security ... Continue Reading
Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these ... Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A malvertising campaign by the AdGholas group has been found spreading the Stegano exploit kit. Expert Nick Lewis explains how web advertisements are used in this attack. Continue Reading
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on their systems. Continue Reading
The Ticketbleed bug in some F5 Networks products caused session IDs and uninitialized memory to leak. Expert Judith Myerson explains what a session ID is and how attackers use it. Continue Reading