Tackle endpoint defense issues to obtain the best endpoint security
-
Blog
Morphisec plans to bring back endpoint security – with a twist
Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works. Read Now
-
Article
Six ways to improve endpoint device security
Endpoint devices are often the root cause of data breaches. Expert Eric Cole explains the best ways to improve endpoint protection. Read Now
-
Article
Why signature-based detection isn't enough for enterprises
Signature-based detection and machine learning algorithms identify malicious code and threats. Expert Michael Cobb explains how both techniques defend networks and endpoints. Read Now
-
Article
Understanding footprinting as a predecessor to cyberattacks
Footprinting can often lead to cyberattacks on an enterprise. Expert Ernie Hayden explains the footprinting technique and how it's performed. Read Now
Editor's note
Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense focus. But while its history is old, the basic problem of protecting devices has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply. Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. But reading this Essential Guide will get you up to speed quickly on everything you need to know to develop a strategy to achieve the best endpoint protection possible, as well as help you in your research and purchase process and the post-purchase management of your new security tool.
1When endpoint protection goes mobile
Mobile not only invites traditional endpoint attacks, it also creates new realms of vulnerability in areas such as data loss. At this point, approaches to providing security range all across the board.
-
Article
Evolving mobile security management thwarts unified endpoint management
Experts say unified endpoint management for mobile devices, laptops and desktops will take more time due to the complex, evolving demands of mobile security management. Read Now
-
Article
More endpoints managed is security concern, say IT services firms
The rising number of devices connected to corporate networks is a security challenge for the IT services firms managing these endpoints Read Now
-
Article
Mobile security strategy matures with BYOD
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Read Now
2Endpoint management and incident response
The downside of the best endpoint security system? An overabundance, at times, of security alerts. But there are tools and alternative methods to make this management and response process easier.
-
Article
CSA report shows frustrations with security alerts, endpoint agents
New Cloud Security Alliance research shows growing fatigue with security alerts and endpoint agents, as well as growing adoption of IaaS and positive signs for Microsoft Azure. Read Now
-
Article
Endpoint threat detection gets more response
While there’s a major focus on continuous endpoint monitoring and remediation today, security teams have to fight malware on all fronts. Read Now
-
Article
The incident response process is on the clock
No time to prepare for incident handling? Security tools aim to automate the incident response process and help organizations lessen the time between threat detection and response. Read Now
-
Article
A HIP way of securing a wide range of endpoints
The host identity protocol is emerging as an alternative way to secure a range of physical endpoints beyond laptops and smartphones Read Now
3Endpoint protection products and tools
Searching for products that will deliver the best endpoint protection can be complicated. How do you identify the tools suited to your system’s needs? What questions should you ask to whittle down your short list? Read the following to help focus your vendor and product selection process.
-
Article
What endpoint protection software is on your short list?
Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints. Read Now
-
Article
Endpoint protection: How to select virtualization security tools
Most virtualization security tools still follow dedicated agent models, but some technologies are starting to offload resources to a dedicated VM and leverage hypervisor APIs. Read Now
-
Article
Ten questions to ask endpoint security vendors
Evaluating endpoint security vendors and their products can be a challenging task. Expert Karen Scarfone outlines 10 must-ask questions to start your list. Plus, check out a list of comprehensive endpoint security vendors Read Now
-
Article
Integrated security suite advantages and drawbacks
Can an integrated security suite provide advantages in cost and performance? We look at key focus areas for security practitioners as security tools increasingly converge. Read Now
-
Article
Is a security cloud service your best endpoint defense?
Cloud technologies often have a bad reputation when it comes to security, but that may be unfair. Is the cloud the best answer for securing the endpoints in your enterprise? Read Now
-
Article
Endpoint data protection products offer backup, file sync and security
Today's crop of endpoint and mobile data protection products blend backup, file sync and security functionality to increase user productivity while protecting against data loss. Read Now