New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Endpoint protection and client security News
April 16, 2018
CrowdStrike introduced a new component for the vendor's cloud-based security platform -- dubbed Falcon X -- that looks to speed up enterprises' incident response times.
March 12, 2018
In a new document, the Industrial Internet Consortium abridges IEC and NIST publications, offering clear, concise guidance to ensure IIoT security in connected plants.
September 27, 2017
In this week's 'Risk & Repeat' podcast, SearchSecurity editors discuss the U.S. government's Kaspersky ban and how competitors like McAfee are trying to capitalize on it.
August 03, 2017
DigiCert agrees to buy majority stake in Symantec Website Security just days after Google releases an April 2018 distrust date for Symantec certificates.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
Securing mobile devices in the enterprise to effectively deflect potential breaches now means enterprise mobile management must evolve into unified endpoint management. Continue Reading
Security gaps in mobile devices can be many and varied, but they must be addressed immediately. Unified endpoint management is the next-gen way to close the gaps. Continue Reading
Attacks on enterprise mobile endpoints are more lethal than ever. To help infosec pros fight back, enterprise mobile management has unified to fortify defenses. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With the perimeter wall gone, securing enterprise endpoints is even more essential. Learn how automation and other developments can up endpoint security now. Continue Reading
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
Enterprises are more focused on SD-WAN security as they increase connectivity among branches and determine how best to protect their users and devices from a growing threat landscape. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
IT needs an effective plan to maximize security for Windows 10 and get the most out of its built-in features. Continue Reading
Due to the rising value of bitcoin and other cryptocurrency, hackers have started to use cryptojacking to mine bitcoin. Learn what this means for end users with expert Nick Lewis. Continue Reading
Modern SMB cybersecurity increasingly involves managed detection and response services, improved zero-day attack spotting and better management of connected devices. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Consider security compliance regulations for your industry as a starting point and a guide for planning your specific approach to enterprise endpoint protection. Continue Reading
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it happened, and what to do about it. Continue Reading
Learning to secure endpoints will increase your ability to keep data safe. First thing to do: Find and fix any weaknesses that hackers can use to enter your system. Continue Reading