Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

Webinar
Webinar
Security Alert Overload: MDR Is the Answer
Industrialized cyber-criminal operations and increased nation-state-sponsored cyber espionage activities mean that most organizations are under continual cyber-attack, but the worldwide shortage of...
Learn more
Blog
Blog
Proper Patch Management Is Risk-Oriented
With regard to cybersecurity, the year 2020 kicks off with considerable upheavals. Few days ago, my colleague Warwick wrote about the security problems that arise with some of Citrix's products...
Learn more
Whitepaper
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #143: Vulnerability Management: Emergency Patching and How to Deal with "Zero Days"
Sometimes Vulnerability Management has to take care of current threats very quickly: Christopher Schütze is today's guest in this episode and explains which processes are necessary when a...
Learn more
Ransomware Attacks in a Protected Environment
Blog
Ransomware Attacks in a Protected Environment
Tune in to Florian Jörgens, CISO at Vorwerk discussing ransomware attacks and why networking is important to counter it.
Tanium XEM Platform
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Managed Detection and Response (MDR)
Leadership Compass
Managed Detection and Response (MDR)
This KuppingerCole Leadership Compass provides an overview of the market for Managed Detection & Response services that manage a collection of cybersecurity technologies for a client organization...
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome...
Unified Endpoint Management (UEM)
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an updated overview of the Unified Endpoint Management (UEM) market and provides a compass to help you find the solution that best meets your needs. We examine the market...
Real-time Fraud Detection - Challenges and Solutions
Event Recording
Real-time Fraud Detection - Challenges and Solutions
Fraud can be considerably reduced via speed, scalability, and stability. Investigating fraudulent activities, using fraud detection machine learning is crucial where decisions need to be made in...
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Event Recording
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Traditional network security focuses on perimeter defenses, but many organisations, systems and processes no longer have a clearly defined network perimeter. To protect a modern digital...
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
Event Recording
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
The digital identity paradigm looks set to evolve. Citizens might rely on digital identity wallets within a few years. As the metaverse and Web 3.0 take shape, users will need more than ever to...
Current Work and Future Trends in Selective Disclosure
Event Recording
Current Work and Future Trends in Selective Disclosure
There’s a lot of foundational work happening in the space of Selective Disclosure (SD) right now. Selective Disclosure enables you to have a token with many claims (say, an ISO Mobile...
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
Event Recording
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
ITDR: Is this really something new, given that around 80% of the cyberattacks are identity-related, from password phishing to bypassing MFA? Is it a separate discipline or just a part of XDR...
1 2 3 4 5 6 7 Next