Insights

Endpoint security

Computers, mobile devices, IoT devices are targets for takeovers. Endpoint security solutions are designed to prevent malware from executing, detect and recover from compromises, and manage endpoint assets. Endpoint security products are conglomerations of several additional discrete functions, such as browser protection, system file integrity monitoring, application controls, and device firewalls. Endpoint security solutions are must-haves for every organization.

KC Open Select
KC Open Select
Unified Endpoint Management
Unified Endpoint Management refers to comprehensive solutions with capabilities that support a range of endpoint types.
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Attack Surface Reduction and XDR
Many if not most organizations have moved to a risk management model for cybersecurity and identity management. Priorities have shifted in two major ways over the last decade: decreasing...
Learn more
Executive View
Executive View
Microsoft Entra Permissions Management
As organizations adopt multi cloud infrastructures to support business workflows involving user and workload identities it's increasingly difficult to know who has access to what data across which...
Learn more
Webinar Recording
Webinar Recording
Effective Endpoint Security With Automatic Detection and Response Solutions
The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the...
Learn more
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business
Webinar Recording
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business
„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in...
Make your Enterprise Applications Ready for Customers and Mobile Users
Webinar Recording
Make your Enterprise Applications Ready for Customers and Mobile Users
Rapidly growing demand for exposing and consuming APIs, which enables organizations to create new business models and connect with partners and customers, has tipped the industry towards adopting...
Secure Mobile Information Sharing: Adressing Enterprise Mobility Challenges in an Open, Connected Business
Webinar Recording
Secure Mobile Information Sharing: Adressing Enterprise Mobility Challenges in an Open, Connected Business
KuppingerCole Webinar recording
How to Enable Social and Mobile Login - and Beyond
Event Recording
How to Enable Social and Mobile Login - and Beyond
Mike Small, KuppingerCole Ian Glazer, salesforce.com Dr. Michael B. Jones, Microsoft Christian Patrascu, Oracle Corp. Daniel Raskin, ForgeRock Don Schmidt, Microsoft
Borja Rosales, Martin Edwards - Defending Your Data in the Wild: Eliminating the Risks of Mobile Data
Event Recording
Borja Rosales, Martin Edwards - Defending Your Data in the Wild: Eliminating the Risks of Mobile Data
Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany
Panel Discussion - Next Generation Cloud and Mobile Identity Management
Event Recording
Panel Discussion - Next Generation Cloud and Mobile Identity Management
Session at the European Identity & Cloud Conference 2013 May 15, 2013 10:30
BYOD, Social Networking, Cloud - sicher und kalkulierbar
Webinar Recording
BYOD, Social Networking, Cloud - sicher und kalkulierbar
KuppingerCole Webinar recording
BYOD, Social Networking, Cloud - sicher und kalkulierbar
Webinar Recording
BYOD, Social Networking, Cloud - sicher und kalkulierbar
KuppingerCole Webinar recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
Webinar Recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
KuppingerCole Webinar recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
Webinar Recording
Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management
KuppingerCole Webinar recording
EIC 2012 Keynote: What About Bring your own Device?
Event Recording
EIC 2012 Keynote: What About Bring your own Device?
Dr. Barbara Mandl, Senior Manager, Daimler AG April 17, 2012 18:10
How to Prepare for BYOD (Bring Your Own Device)
Webinar Recording
How to Prepare for BYOD (Bring Your Own Device)
Kuppinger Cole Webinar recording
Previous
1 2 3 4 5 6 7 8