New & Notable
Endpoint protection and client security News
March 23, 2020
While plenty of teleworking tools exist to help the increase in people working at home due to COVID-19, managing and protecting proliferating endpoint data can alter IT pros' jobs.
March 05, 2020
BlackBerry continues its push into security by addressing a number of endpoint devices. But analysts discuss whether the former mobile device maker has a perception problem.
February 28, 2020
SearchSecurity has learned completion of the Sophos acquisition is imminent, though the endpoint security vendor says the deal has not officially closed.
January 14, 2020
The 2019 CrowdStrike Services Cyber Front Lines Report found that while the percentage of organizations that self-detected an intrusion is up, dwell time has gone up as well.
Endpoint protection and client security Get Started
Bring yourself up to speed with our introductory content
Cybersecurity fraud's roots run deep, with fraudsters forever after the same thing: tricking others out of their valuable assets. Learn how to keep defenses high. Continue Reading
A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Continue Reading
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. Continue Reading
Evaluate Endpoint protection and client security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this roundup of network blogs, explore expert advice on increasing remote workers' efficiency, potential lasting effects of COVID-19 on networks and the future of networking. Continue Reading
Microsoft continued to refine the software-defined networking capabilities in its latest server operating system by developing several new security features. Continue Reading
The threat protection platform, which underwent a recent name change, comes with some tailored features for Windows Server 2019 to stop attacks and reduce configuration issues. Continue Reading
Manage Endpoint protection and client security
Learn to apply best practices and optimize your operations.
IT leaders share what's working and how they are supporting remote work mandates for employees as part of their corporate pandemic plans, as well as social distancing among IT. Continue Reading
IoT devices flood the market with promises to make daily life more convenient. Learn how to embrace user consent to benefit your organization and enhance user data privacy. Continue Reading
While IT and OT security have historically been separate, the advent of IoT is forcing the two together. Cross-pollinating IT with OT is critical to ensuring IoT security. Continue Reading
Problem Solve Endpoint protection and client security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Being part of island-hopping is no day at the beach when it comes to cyberattacks. Learn how to avoid being either a victim or an attacker's unwitting accomplice. Continue Reading
Why is BEC such a popular attack? Because it works, unfortunately, tempting hackers with huge potential payouts. Learn how to keep them from lining their pockets with your assets. Continue Reading
The antivirus of yesteryear isn't a strong enough competitor to beat modern enterprise threats. Learn about the endpoint security features ready to tackle these battles head-on. Continue Reading