New & Notable
Endpoint protection and client security News
January 14, 2020
The 2019 CrowdStrike Services Cyber Front Lines Report found that while the percentage of organizations that self-detected an intrusion is up, dwell time has gone up as well.
December 04, 2019
NSS Labs dropped its antitrust suit against the Anti-Malware Testing Standards Organization, Symantec and ESET, ending a contentious legal battle in the endpoint security market.
November 11, 2019
OpenText acquires Carbonite, a vendor in cloud-based data protection and backup, disaster recovery and end-point security.
October 22, 2019
Forcepoint has delivered a web-based security tool leveraging elastic cloud gateway technology that allows admins to access content from any remote location.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Continue Reading
In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -- usually the ... Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The threat protection platform, which underwent a recent name change, comes with some tailored features for Windows Server 2019 to stop attacks and reduce configuration issues. Continue Reading
Endpoint attack surfaces are growing, and cybersecurity pros struggle to keep up. Consider the following use cases for AI endpoint security techniques in the enterprise. Continue Reading
A zero-trust security model has a catchy name, but the methodology means more than not trusting any person or device on the network. What you need to know. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
While IT and OT security have historically been separate, the advent of IoT is forcing the two together. Cross-pollinating IT with OT is critical to ensuring IoT security. Continue Reading
Many people believe perimeterless security means borders are a thing of the past. But virtual borders secure APIs needed by mobile users and cloud workloads. Check out how to manage them. Continue Reading
Edge devices are not necessarily designed with security in mind. Organizations need to think critically about how to approach today's edge computing security challenges. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The antivirus of yesteryear isn't a strong enough competitor to beat modern enterprise threats. Learn about the endpoint security features ready to tackle these battles head-on. Continue Reading
Understanding the nature of the top 3 email security threats -- malware, phishing and spoofed domains -- can help reduce their impact. Continue Reading
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. Learn how they work and how to defend against them. Continue Reading