4,396 Results for:endpoints

  • Sort by: 

How to run Windows 365 on a Chromebook

By Will Kelly 14 Feb 2024

Windows 365 running on a Chromebook is a viable option for IT teams seeking a lower-cost and easy-to-maintain endpoint option for their end users. Read More

Endpoint security strategy: Focus on endpoints, apps or both?

By Kyle Johnson 14 May 2021

Companies know how to secure traditional endpoints, but what about mobile devices outside the network? They should decide if they want to protect devices, apps or both. Read More

Create a better endpoint backup strategy for remote work

By Krista Macomber 29 Jul 2022

An endpoint backup strategy must protect data for remote employees working on a variety of devices without IT oversight. Incremental and immutable backups are key. Read More

12 essential features of advanced endpoint security tools

05 Jul 2022

Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. Here are 12 key features endpoint security products should include. Read More

How to fix the top 5 cybersecurity vulnerabilities

By Dave Shackleford 09 Jan 2024

Check out how to fix five top cybersecurity vulnerabilities to prevent data loss from poor endpoint security, ineffective network monitoring, weak authentication and other issues. Read More

IT departments struggling to secure printer endpoints

By Cliff Saran 11 Jan 2022

Printers are at risk of attack, just as any other endpoint device, but many IT leaders are struggling to secure their print infrastructure Read More

How EDR systems detect malicious activity

By Kyle Johnson, No Starch Press 04 Dec 2023

Endpoint detection and response tools help SOCs separate benign events from malicious activity. Learn how this EDR function works. Read More

The 6 best rugged computers for business use cases

By Ed Tittel 30 Nov 2023

Finding the right device for a business scenario can be challenging, and adding rugged conditions to the mix can complicate things further. Learn about that endpoint market. Read More

How endpoint encryption works in a data security strategy

By Michael Cobb 15 Mar 2022

Companies should use encryption to keep data on endpoints protected should an attacker successfully get hold of a device or breach enterprise security measures. Read More

How to run Windows 365 on Mac

By Peter van der Woude 21 Dec 2023

IT teams must be prepared to deliver Windows 365 Cloud PCs to all sorts of endpoints -- not just Windows desktops. Admins can take steps to facilitate this access on Mac desktops. Read More