Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ransomware Attacks in a Protected Environment
Tune in to Florian Jörgens, CISO at Vorwerk discussing ransomware attacks and why networking is important to counter it.
Learn more
Leadership Compass
Leadership Compass
Data Leakage Prevention
This KuppingerCole Leadership Compass provides an overview of the market for Data Leakage Prevention (DLP) and provides you with a compass to help you to find the solution that best meets your...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
The SolarWinds incident made the news in December 2020 and continues to impact many organizations. John Tolbert joins Matthias to give a short introduction of what decision makers need to know at...
Learn more
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
Webinar Recording
Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices
When discussing the matters of industrial cybersecurity with IT experts, lamenting the historical divide between OT and IT seems to be a popular topic: you would often hear that the OT engineers...
Five Steps to Building an Effective Insider Threat Program
Webinar Recording
Five Steps to Building an Effective Insider Threat Program
The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and...
Modern Endpoint Protection – Automating Prevention, Detection, and Response
Webinar Recording
Modern Endpoint Protection – Automating Prevention, Detection, and Response
“Antivirus is dead!” - we’ve heard talks like this for years. Some experts would point out that traditional signature-based products cannot detect zero-day attacks or...
An overview of the Leadership Compass: Endpoint Security Anti-Malware
Webinar Recording
An overview of the Leadership Compass: Endpoint Security Anti-Malware
Malware has been on the rise. Ransomware continues to grab the headlines. New malware variants proliferate by the millions. Old style manual malware analysis can't keep pace. But organizations are...
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
Webinar Recording
How Advanced Identity and API Management Helps You Meeting the Security Challenges of Digital Transformation
The new business environment is increasingly reliant on web and open source applications, with external partners and customers accessing resources via web browsers and social media channels....
Denis Joannides - Empowering the Digital Insurers
Event Recording
Denis Joannides - Empowering the Digital Insurers
In this session Denis explains how insurance companies such as Unive, AEGON, VGZ and many others leverage Consumer IAM (CIAM) and a secure API Architecture for Mobile Apps to actually transform to...
Creating Secure and Unified Next Generation Workspaces
Webinar Recording
Creating Secure and Unified Next Generation Workspaces
Identity Management, Endpoint Security, Mobile Device Management and Access Management, are still considered to be isolated disciplines. This can make administration and governance in these areas...
Cloud Access Security and Enterprise Mobility - Better Together
Webinar Recording
Cloud Access Security and Enterprise Mobility - Better Together
For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that...
Managing Risk through Cloud App Authentication and 360° Control
Webinar Recording
Managing Risk through Cloud App Authentication and 360° Control
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations...
The Future of Mobile Authentication: Strong, Adaptive, Intelligent
Webinar Recording
The Future of Mobile Authentication: Strong, Adaptive, Intelligent
The unstoppable march of cloud, mobile and social computing in the recent years has made a profound impact on our society. Exponential growth of corporate digital assets combined with the...
Whitelisting und darüber hinaus
Webinar Recording
Whitelisting und darüber hinaus
KuppingerCole Webinar recording
Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis
Webinar Recording
Vulnerability Assessment 2.0: Improving Accuracy and Reducing Costs with Behavior Analysis
Vulnerability scanners and management tools have been an important part of every information security specialist’s arsenal for decades. Nowadays, with the continued erosion of corporate perimeters...