Endpoint protection and client security
Get information on client security pratcices, including how to build, implement and maintain secure endpoint protection products and procedures for keeping your network safe from potentially unsecure laptops, desktops, and other endpoint devices.
New & Notable
Endpoint protection and client security News
-
September 28, 2020
28
Sep'20
Ivanti makes double acquisition of MobileIron, Pulse Secure
Ivanti will acquire all outstanding shares of MobileIron stock for approximately $872 million. The financial terms of Pulse Secure's acquisition were not disclosed.
-
June 15, 2020
15
Jun'20
Druva integrates with FireEye Helix for secure backups
The partnership allows security admins to see access history and activity in Druva through FireEye Helix's console, enabling quicker responses to security anomalies.
-
April 08, 2020
08
Apr'20
Box Shield adds malware detection
Box Inc. quarantines malware-infected files with features that allow content to be viewed, with admin and security team alerts to address threats before they spread.
-
March 23, 2020
23
Mar'20
Companies bolster endpoint data protection for remote work
While plenty of teleworking tools exist to help the increase in people working at home due to COVID-19, managing and protecting proliferating endpoint data can alter IT pros' jobs.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
-
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms. Continue Reading
-
Endpoint security quiz: Test your knowledge
Test your knowledge of SASE, split tunneling, and device discovery tool capabilities and best practices in this endpoint security quiz for IT professionals. Continue Reading
-
software-defined perimeter (SDP)
The software-defined perimeter, or SDP, is a security framework that controls access to resources based on identity. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Extended detection and response tools take EDR to next level
Extended detection and response tools offer new capabilities -- among them greater visibility -- to enterprises searching for better ways to protect their endpoints. Continue Reading
-
6 requirements for choosing a new endpoint security platform
Organizations should make sure their desktop management platform meets certain endpoint security requirements, such as network protection, data protection and use of AI. Continue Reading
-
4 lasting effects of growing remote workforces on networks
In this roundup of network blogs, explore expert advice on increasing remote workers' efficiency, potential lasting effects of COVID-19 on networks and the future of networking. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
-
Key SOC metrics and KPIs: How to define and use them
Enterprises struggle to get the most out of their security operation centers. Using the proper SOC metrics and KPIs can help. Learn how to define and benefit from them here. Continue Reading
-
A case for both cybersecurity detection and prevention tools
Companies need both detection and prevention cybersecurity tools to effectively keep data and employees safe from attackers. Just one or the other isn't enough. Continue Reading
-
Why nation-state cyberattacks must be top of mind for CISOs
Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Here's why. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to secure a home network for remote workforces
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network. Continue Reading
-
3 must-ask post-pandemic questions for CISOs
The worldwide health pandemic has created multiple challenges for today's CISOs and their security teams. Ask these three questions to stay safe in a post-pandemic workplace. Continue Reading
-
Microsoft Defender ATP taps into cloud for added protection
Enterprises that want to wrap up their systems in an extra layer of security have the option for more enhanced protection that integrates with other Microsoft products. Continue Reading