Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Microsoft’s Threat Intelligence Play is Good News for Customers in Fight Against Ransomware
This week, Microsoft made official its agreement to acquire Threat Intelligence vendor RiskIQ in a deal rumoured to be worth around $500m. It is not an unusual event; Microsoft has absorbed five...
Learn more
Whitepaper
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Learn more
Webinar Recording
Webinar Recording
Endpoint Protection Made Easy With Privilege Management
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis,...
Learn more
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
Analyst Chat
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC...
Ransomware
Blog
Ransomware
Ransomware attacks that encrypt critical data and then extort ransom payments for the decryption key are among the biggest cyber risks for enterprises of all sizes in every industry, with the...
Analyst Chat #91: Vulnerability Management
Analyst Chat
Analyst Chat #91: Vulnerability Management
Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability...
Analyst Chat #88: What (and why) is XDR?
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei...
Microsoft’s Threat Intelligence Play is Good News for Customers in Fight Against Ransomware
Blog
Microsoft’s Threat Intelligence Play is Good News for Customers in Fight Against Ransomware
This week, Microsoft made official its agreement to acquire Threat Intelligence vendor RiskIQ in a deal rumoured to be worth around $500m. It is not an unusual event; Microsoft has absorbed five...
What is XDR?
Blog
What is XDR?
Almost all enterprises have many security tools in place already, some of which are still focused on perimeters/DMZs and on hosts, such as servers and endpoints. Endpoint Detection & Response...
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
Blog
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up...
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
Analyst Chat
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at...
Effective Endpoint Security With Automatic Detection and Response Solutions
Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the...
This Is Why We Can’t Have Nice Things
Blog
This Is Why We Can’t Have Nice Things
I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an...
Attack Surface Reduction and XDR
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
Putting Your First-Line Worker at the Center of Attention
Blog
Putting Your First-Line Worker at the Center of Attention
Since the beginning of the Covid-19 crisis, the use of language in public life, in the press, and in everyday life has changed. Terms that were formerly confined to the circles directly affected...
Previous
7 8 9 10 11 12 13 Next