Endpoint security News

View All News

Endpoint security Get Started

Bring yourself up to speed with our introductory content

  • Cybersecurity roadmap: What's driving CISOs' agendas for 2018

    Omar F. Khawaja, CISO at Highmark Health, has five areas of focus on his cybersecurity roadmap, and technology is not at the top of the list. Instead, he is prioritizing organizational change management and building an effective decision-making framework for the security leaders of the national healthcare provider and insurer.

    While Khawaja's cybersecurity roadmap may sound ambitious, his focus on risk management and team decision-making to align the security program with the healthcare organization's business strategy is far from unique. Studies show that executives increasingly recognize that a cyberattack could cripple their operations and mean millions in lost business and reputational damage as well as in cleanup costs.

    "CISOs are now charged with defending this digital infrastructure, and that includes software everywhere and data as a resource, and that's a massive change at a time when the attack surface keeps expanding," says Jeff Pollard, an analyst at Forrester Research.

    In this issue of Information Security magazine, security professionals detail the process of developing effective one-year plans. Why do companies struggle to strengthen their cybersecurity roadmap? We look at effective planning, what could go wrong and how to get support for your strategy.

     Continue Reading

  • Five questions to ask before purchasing NAC products

    Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading

  • Learn what network access control systems can do for you

    Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading

View All Get Started

Evaluate Endpoint security Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Endpoint security

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Endpoint security Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve