New & Notable
Endpoint protection and client security News
November 11, 2019
OpenText acquires Carbonite, a vendor in cloud-based data protection and backup, disaster recovery and end-point security.
October 22, 2019
Forcepoint has delivered a web-based security tool leveraging elastic cloud gateway technology that allows admins to access content from any remote location.
October 21, 2019
Private equity firm Thoma Bravo made an offer to acquire Sophos for approximately $3.9 billion. Analysts discuss what the deal might mean for the endpoint security vendor.
September 24, 2019
Analysts describe HP's Bromium acquisition as a safe, cheap, smart bet in its push to compete with Dell. It's also another sign of rapid consolidation in the endpoint security market.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. Continue Reading
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Continue Reading
Countering cyberthreats through human effort alone is impossible; you need to add AI and machine learning products to your security program. Here's how to get started. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A zero-trust security model has a catchy name, but the methodology means more than not trusting any person or device on the network. What you need to know. Continue Reading
Check out this product roundup and discover all the features endpoint security protection offers, such as patch management, email protection and reporting. Continue Reading
In addition to protecting an organization's endpoints from threats, IT administrators can use endpoint security products to monitor operation functions and data backup strategies. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
City ransomware attacks are disruptive, annoying and potentially life-threatening. In increasingly mobile and perimeterless networks, how can municipalities prevent the risk? Continue Reading
Artificial intelligence, and machine learning in particular, is being fruitfully employed in IT security tools. Learn where this advanced technology works best now. Continue Reading
The TP-Link EAP Controller for Linux was recently found to be vulnerable to attacks. Learn from Judith Myerson what this means for users and how it can be prevented. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The antivirus of yesteryear isn't a strong enough competitor to beat modern enterprise threats. Learn about the endpoint security features ready to tackle these battles head-on. Continue Reading
Understanding the nature of the top 3 email security threats -- malware, phishing and spoofed domains -- can help reduce their impact. Continue Reading
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. Learn how they work and how to defend against them. Continue Reading