Endpoint security News
March 12, 2018
In a new document, the Industrial Internet Consortium abridges IEC and NIST publications, offering clear, concise guidance to ensure IIoT security in connected plants.
March 09, 2018
Datto is planning updates to Autotask Endpoint Management and Autotask PSA in the coming months, as it continues to integrate its product lines; other news from the week.
January 26, 2018
This week, bloggers look into choosing the right network configuration software for an automation project, endpoint security and the future of SD-WAN as a stand-alone service.
December 01, 2017
AWS continues to push its Virtual Private Cloud as the new norm for cloud development and deployment, and further limit public internet exposure. AWS PrivateLink enables customers to privately ...
Endpoint security Get Started
Bring yourself up to speed with our introductory content
Omar F. Khawaja, CISO at Highmark Health, has five areas of focus on his cybersecurity roadmap, and technology is not at the top of the list. Instead, he is prioritizing organizational change management and building an effective decision-making framework for the security leaders of the national healthcare provider and insurer.
While Khawaja's cybersecurity roadmap may sound ambitious, his focus on risk management and team decision-making to align the security program with the healthcare organization's business strategy is far from unique. Studies show that executives increasingly recognize that a cyberattack could cripple their operations and mean millions in lost business and reputational damage as well as in cleanup costs.
"CISOs are now charged with defending this digital infrastructure, and that includes software everywhere and data as a resource, and that's a massive change at a time when the attack surface keeps expanding," says Jeff Pollard, an analyst at Forrester Research.
In this issue of Information Security magazine, security professionals detail the process of developing effective one-year plans. Why do companies struggle to strengthen their cybersecurity roadmap? We look at effective planning, what could go wrong and how to get support for your strategy.Continue Reading
Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
Evaluate Endpoint security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With the perimeter wall gone, securing enterprise endpoints is even more essential. Learn how automation and other developments can up endpoint security now. Continue Reading
IT is overloaded with slick marketing terms that have little or no substance behind them – the classic “solution searching for a problem” scenario but… just occasionally the complete opposite prevails Continue Reading
VMware announced AppDefense, its latest effort to help improve endpoint security. Matt Pascucci explains how AppDefense addresses applications in vSphere environments. Continue Reading
Manage Endpoint security
Learn to apply best practices and optimize your operations.
A watering hole attack led to CCleaner malware being installed on millions of systems. Nick Lewis explains how the attack worked and why it should concern enterprises. Continue Reading
Due to the rising value of bitcoin and other cryptocurrency, hackers have started to use cryptojacking to mine bitcoin. Learn what this means for end users with expert Nick Lewis. Continue Reading
VMware AppDefense integrates with a variety of tools and products. These partnerships reveal insight into application behavior, including automated responses to deviations. Continue Reading
Problem Solve Endpoint security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Antivirus software is crucial to your device's security. However, less is often more, especially when considering a secondary free antivirus program. Nick Lewis explains why. Continue Reading
Consider security compliance regulations for your industry as a starting point and a guide for planning your specific approach to enterprise endpoint protection. Continue Reading
By making IoT devices more resistant to hijacking attempts, we can successfully deprive botnets of unprotected endpoints and effectively mitigate DDoS attacks. Continue Reading