Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Learn more
Executive View
Executive View
SentinelOne Singularity Platform
Die SentinelOne Singularity Platform ist eine Sicherheitsanalyseplattform für vereinten Schutz, Erkennung, Reaktion sowie Behebung in heterogenen IT-Umgebungen auf der Grundlage einer autonomen...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #140: Debunking the Myth of the Human Being the Biggest Risk in Cybersecurity
It is always easy to blame people, i.e. users, for data breaches and ransomware attacks. But is that really still true today? Martin Kuppinger and Matthias discuss this cybersecurity myth and...
Learn more
Federation Bubbles - Dynamic Trust Moves Beyond The Commons
Event Recording
Federation Bubbles - Dynamic Trust Moves Beyond The Commons
Traditional federation agreements are relatively static. It takes some effort to onboard an IdP and RP to each other, but once that trust is established, it's good until some exceptional event...
Panel | Addressing Universal Digital Vulnerability with Modern Identity
Event Recording
Panel | Addressing Universal Digital Vulnerability with Modern Identity
The risk of being digitally vulnerable, or not being able to access basic services, affects us all. There can be no doubt that enhancing accessibility features across digital access journeys is...
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Building a successful vulnerability management service concept
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted...
The Next Generation of Secure Access with Zero Trust
Event Recording
The Next Generation of Secure Access with Zero Trust
Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.
IAM: The Guardian Angel of Zero Trust
Event Recording
IAM: The Guardian Angel of Zero Trust
In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes...
Panel | It all starts with the Endpoint
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Thanks to AI, the Future of Security Is Collaborative
Event Recording
Thanks to AI, the Future of Security Is Collaborative
AI actors are poised to eclipse the number of human users on the internet. Many industry observers have decried such growth, pointing to the immense risks that such a brave new world poses. How...
Navigating Cybersecurity: Market Size and Predictive Insights
Event Recording
Navigating Cybersecurity: Market Size and Predictive Insights
In an increasingly technological ly interconnected world, c ybersecurity teams are the defender s of digital frontlines. Looking ahead to the future, this session d ive s into...