An overview of the Leadership Compass: Endpoint Security Anti-Malware
- LANGUAGE: English DATE: Tuesday, April 24, 2018 TIME: 4:30pm CEST, 10:30am EDT, 7:30am PDT
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to help their customer successfully defend against these attacks.
Endpoint security products often contain more features than anti-malware, such as URL filtering, application whitelisting, backup, configuration management, patch management, disk and file encryption, etc. The focus of this latest KuppingerCole Leadership Compass is on anti-malware solutions at the endpoint, specifically desktops and laptops running Microsoft Windows, Mac OS, and Linux variants. Most of the vendors considered in the rating provide solutions for servers, virtual desktops, and mobile devices.
The KuppingerCole Leadership Compass provides an overview of the leading vendors in a market segment. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit for a customer and his requirements. However, a Leadership Compass will help identify those vendors that customers should look at more closely.
In the first part of the webinar, John Tolbert, Lead Analyst at KuppingerCole, will talk about:
- The Endpoint Security Anti-Malware market
- Categories of Anti-Malware Features
- KuppingerCole Leadership Compass methodology and evaluation criteria
- The Overall Leaders in the Endpoint Security Anti-Malware market
In the second part you will have the opportunity to ask questions about the state of Anti-Malware and KuppingerCole’s latest Leadership Compass on this topic.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.