An overview of the Leadership Compass: Endpoint Security Anti-Malware
- LANGUAGE: English DATE: Tuesday, April 24, 2018 TIME: 4:30pm CEST, 10:30am EDT, 7:30am PDT
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are increasingly under attack. Fortunately, vendors have been enhancing and improving their products to help their customer successfully defend against these attacks.
Endpoint security products often contain more features than anti-malware, such as URL filtering, application whitelisting, backup, configuration management, patch management, disk and file encryption, etc. The focus of this latest KuppingerCole Leadership Compass is on anti-malware solutions at the endpoint, specifically desktops and laptops running Microsoft Windows, Mac OS, and Linux variants. Most of the vendors considered in the rating provide solutions for servers, virtual desktops, and mobile devices.
The KuppingerCole Leadership Compass provides an overview of the leading vendors in a market segment. Picking solutions always requires a thorough analysis of customer requirements and a comparison with product features. Leadership does not always mean that a product is the best fit for a customer and his requirements. However, a Leadership Compass will help identify those vendors that customers should look at more closely.
In the first part of the webinar, John Tolbert, Lead Analyst at KuppingerCole, will talk about:
- The Endpoint Security Anti-Malware market
- Categories of Anti-Malware Features
- KuppingerCole Leadership Compass methodology and evaluation criteria
- The Overall Leaders in the Endpoint Security Anti-Malware market
In the second part you will have the opportunity to ask questions about the state of Anti-Malware and KuppingerCole’s latest Leadership Compass on this topic.
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.