New & Notable
Endpoint protection and client security News
June 15, 2020
The partnership allows security admins to see access history and activity in Druva through FireEye Helix's console, enabling quicker responses to security anomalies.
April 08, 2020
Box Inc. quarantines malware-infected files with features that allow content to be viewed, with admin and security team alerts to address threats before they spread.
March 23, 2020
While plenty of teleworking tools exist to help the increase in people working at home due to COVID-19, managing and protecting proliferating endpoint data can alter IT pros' jobs.
March 05, 2020
BlackBerry continues its push into security by addressing a number of endpoint devices. But analysts discuss whether the former mobile device maker has a perception problem.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
Enterprises that want to wrap up their systems in an extra layer of security have the option for more enhanced protection that integrates with other Microsoft products. Continue Reading
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Organizations should make sure their desktop management platform meets certain endpoint security requirements, such as network protection, data protection and use of AI. Continue Reading
In this roundup of network blogs, explore expert advice on increasing remote workers' efficiency, potential lasting effects of COVID-19 on networks and the future of networking. Continue Reading
Microsoft continued to refine the software-defined networking capabilities in its latest server operating system by developing several new security features. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
Companies need both detection and prevention cybersecurity tools to effectively keep data and employees safe from attackers. Just one or the other isn't enough. Continue Reading
Even though organizations face threats coming from many sources, one type of cyberattack should be top of mind for CISOs: those backed by nation-states. Here's why. Continue Reading
The zero-trust networking model makes sense to offset modern threats, IEEE senior member Jack Burbank advises, but it's not without adoption, deployment and management challenges. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network. Continue Reading
The worldwide health pandemic has created multiple challenges for today's CISOs and their security teams. Ask these three questions to stay safe in a post-pandemic workplace. Continue Reading
One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Continue Reading