Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ransomware
Ransomware attacks that encrypt critical data and then extort ransom payments for the decryption key are among the biggest cyber risks for enterprises of all sizes in every industry, with the...
Learn more
Executive View
Executive View
SentinelOne Singularity Platform
Die SentinelOne Singularity Platform ist eine Sicherheitsanalyseplattform für vereinten Schutz, Erkennung, Reaktion sowie Behebung in heterogenen IT-Umgebungen auf der Grundlage einer autonomen...
Learn more
Webinar Recording
Webinar Recording
Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises
The traditional approach forces enterprises to deploy multiple additional security solutions – EPP, EDR or NDR among them – to try and close remaining gaps, leading to even higher...
Learn more
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
Analyst Chat
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
EIC 2021 finally took place in Munich in a hybrid format between on-site and online. Of course, Matthias took the opportunity to sit down with his analyst colleagues in person for some EIC...
Analyst Chat #91: Vulnerability Management
Analyst Chat
Analyst Chat #91: Vulnerability Management
Christopher Schütze provides the fundamentals for a pivotal topic in cybersecurity, namely how to create processes and systems for comprehensive and continuously improving vulnerability...
Analyst Chat #88: What (and why) is XDR?
Analyst Chat
Analyst Chat #88: What (and why) is XDR?
XDR (eXtended Detection & Response) solutions are an emerging category of security tools that are designed to consolidate and replace multiple point solutions. John Tolbert and Alexei...
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
Analyst Chat
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at...
Effective Endpoint Security With Automatic Detection and Response Solutions
Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the...
Operationalizing Least Privilege
Webinar Recording
Operationalizing Least Privilege
Striking the balance between enabling users and administrators to be productive whilst protecting your sensitive systems and data is becoming ever more challenging. Attackers are often one step...
Using Deception for Early and Efficient Threat Detection
Webinar Recording
Using Deception for Early and Efficient Threat Detection
Most organizations are benefiting from the scalability, flexibility, and convenience of modern cloud services and new, highly distributed hybrid corporate networks. Unfortunately, many have also...
Analyst Chat #39: The Pros and Cons of Agentless Security
Analyst Chat
Analyst Chat #39: The Pros and Cons of Agentless Security
John Tolbert and Matthias Reinwarth discuss benefits and limitations of agentless security solutions.
Endpoint Protection Made Easy With Privilege Management
Webinar Recording
Endpoint Protection Made Easy With Privilege Management
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis,...
Minimizing Security Impacts of a Growing Remote Workforce
Webinar Recording
Minimizing Security Impacts of a Growing Remote Workforce
Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. However, an expanding remote workforce can...
Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises
Webinar Recording
Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises
The traditional approach forces enterprises to deploy multiple additional security solutions – EPP, EDR or NDR among them – to try and close remaining gaps, leading to even higher...
Analyst Chat #3: Protecting Your Organization Against Ransomware
Analyst Chat
Analyst Chat #3: Protecting Your Organization Against Ransomware
Matthias Reinwarth and Alexei Balaganski discuss the history of ransomware and the measures needed to protect yourself against it. Read also: Business Resilience Management (Crisis Roadmap...