Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Learn more
Whitepaper
Whitepaper
Claroty – Visibility into Vulnerability
Organizations are facing a brave new world in which governments are taking a proactive role in constraining cybersecurity risks. Companies with operational infrastructure that is deemed ‘critical’...
Learn more
Event Recording
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Learn more
Tanium XEM Platform
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Managed Detection and Response (MDR)
Leadership Compass
Managed Detection and Response (MDR)
This KuppingerCole Leadership Compass provides an overview of the market for Managed Detection & Response services that manage a collection of cybersecurity technologies for a client organization...
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Webinar Recording
Achieve Effective Risk and Vulnerability Management With a Platform Approach
Join security experts from KuppingerCole Analysts and Tanium as they discuss the common challenges faced in identifying, prioritizing, and remediating security vulnerabilities, and how to overcome...
Unified Endpoint Management (UEM)
Leadership Compass
Unified Endpoint Management (UEM)
This report provides an updated overview of the Unified Endpoint Management (UEM) market and provides a compass to help you find the solution that best meets your needs. We examine the market...
Real-time Fraud Detection - Challenges and Solutions
Event Recording
Real-time Fraud Detection - Challenges and Solutions
Fraud can be considerably reduced via speed, scalability, and stability. Investigating fraudulent activities, using fraud detection machine learning is crucial where decisions need to be made in...
Current Work and Future Trends in Selective Disclosure
Event Recording
Current Work and Future Trends in Selective Disclosure
There’s a lot of foundational work happening in the space of Selective Disclosure (SD) right now. Selective Disclosure enables you to have a token with many claims (say, an ISO Mobile...
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
Event Recording
Wallets and Beyond: How Mobile Operators Will Enable Tomorrow’s Identity
The digital identity paradigm looks set to evolve. Citizens might rely on digital identity wallets within a few years. As the metaverse and Web 3.0 take shape, users will need more than ever to...
Building Identity Bridges: Where Digital Identity and People's Expectations Meet.
Event Recording
Building Identity Bridges: Where Digital Identity and People's Expectations Meet.
This presentation will bring together and report on experiences in developing identity and privacy standards that are technically feasible but that also address the lived experience of people...
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Event Recording
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Traditional network security focuses on perimeter defenses, but many organisations, systems and processes no longer have a clearly defined network perimeter. To protect a modern digital...
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
Event Recording
Navigate the DR (Detection & Response) Jungle: EDR, EPDR, XDR, NDR, MDR, ITDR
ITDR: Is this really something new, given that around 80% of the cyberattacks are identity-related, from password phishing to bypassing MFA? Is it a separate discipline or just a part of XDR...
The MFA Dilemma and Moving Beyond Mobile
Event Recording
The MFA Dilemma and Moving Beyond Mobile
This panel  will explore the current state of multifactor authentication (MFA) and its limitations, as well as potential solutions for improving the security and user experience of MFA. We...
Validating the Security of Mobile Authentication Apps
Event Recording
Validating the Security of Mobile Authentication Apps
You are shifting through RFIs for a new mobile app based multi-factor authentication solution for your company. The vendors claim that their products are 100% secure and we all know that there's...
Previous
1 2 3 4 5 6 7 Next