Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

Blog
Blog
PAM in a Post-Pandemic Digital World
Business IT and the way people work is changing. Trends towards digital transformation and remote working have only been accelerated by the global Covid pandemic. Therefore, the ways organizations...
Learn more
Executive View
Executive View
ARCON Endpoint Privilege Management
The number of privileged requests made from endpoints has increased significantly in recent years, and more so since the pandemic. Those with traditional privileged access may now be working from...
Learn more
Event Recording
Event Recording
Lessons Learned: Responding to Ransomware Attacks
The last year has seen almost two-thirds of mid-sized organizations worldwide experiencing an attack. Managing ransomware attacks requires significant patience, preparedness and foresight –...
Learn more
Security Orchestration Automation and Response (SOAR)
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Debunking Common Myths about XDR
Webinar Recording
Debunking Common Myths about XDR
Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this...
Accelerating Your Digital Business with Customer Identity
Whitepaper
Accelerating Your Digital Business with Customer Identity
The role of Consumer Identity and Access Management (CIAM) is still massively undervalued by many organizations. Both drop-off and churn rates are heavily impacted by cumbersome registration and...
Analyst Chat #150: Clear and Present Danger - Ransomware Threats to Healthcare Providers
Analyst Chat
Analyst Chat #150: Clear and Present Danger - Ransomware Threats to Healthcare Providers
Only a week has passed since John Tolbert, our Cybersecurity Research Director, spoke at CSLS about ransomware and how to combat it. Today, he reports on specific threats posed by ransomware...
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
Event Recording
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
As the intensity and sophistication of cyber-attacks continues to increase amidst an uncertain threat landscape, enterprises are actively looking to embrace security automation as a potential...
Effects of Malware Hunting in Cloud Environments
Event Recording
Effects of Malware Hunting in Cloud Environments
Sustainable Vulnerability Management: Case Study by KuppingerCole
Event Recording
Sustainable Vulnerability Management: Case Study by KuppingerCole
For any large company, regulated or not, it is essential to have a mechanism or process for detecting vulnerabilities. For this purpose, various scanners exist that can automatically scan the...
Debunking Common Myths About XDR
Event Recording
Debunking Common Myths About XDR
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Event Recording
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Ransomware attacks continue to increase in frequency and severity. Every organization needs a ransomware and malware resilience plan. Three major components of such plans should include deploying...
Lessons Learned: Responding to Ransomware Attacks
Event Recording
Lessons Learned: Responding to Ransomware Attacks
The last year has seen almost two-thirds of mid-sized organizations worldwide experiencing an attack. Managing ransomware attacks requires significant patience, preparedness and foresight –...
1 2 3 4 5 6 7 Next