Endpoint Protection

Endpoint Protection coverage at Computerworld

Free and cheap ways to learn about IT security
check engine light

mobile security stock image one bad device

Smarter authentication makes mobile experiences more secure, user friendly

Big data and context help make authentication experiences in today's mobile and digital world more secure, yet easier to use.

primary intro

Review: Threat hunting turns the tables on attackers

For this review, we tested threat-hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

uk government apple watch ban achieves nothing

UK government Apple Watch ban achieves nothing

What a good time for some mobile security advice

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics and flexible remediation to business networks.

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay. But what about the sensitive data that lives inside your network? How do you make sure it doesn’t get out, either intentionally or by accident? That’s where Data...

endpoint protection 1

10 advanced endpoint protection tools

The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule...

goalie protection save 2

How to buy endpoint security products

While there is no single endpoint security product that can suit all situations, endpoint configurations and IT requirements, there are a few key things to consider in your purchase.

authentication

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage,...

strip protector

55% off Tripp Lite Rotatable Outlet Surge Protector Power Strip - Deal Alert

This power strip has a built-in surge protector, 6 rotatable outlets, an extra long 8 foot cord and a USB port for charging portable devices. Currently averages 4.5 out of 5 stars from almost 600 people on Amazon.

apc supply

48% off APC Back-UPS Pro Uninterruptible Power Supply - Deal Alert

The Back-UPS BR1500G offers guaranteed battery backup and surge protection for high performance computer systems, networks, external storage devices, game consoles and other electronics, and is currently offered at a 48% discount.

endpoint security

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known...

female executive keyhole security

Here's what happens when you drop 200 USB sticks in public

It would be logical to assume that people know the risks around cybersecurity. A recent experiment challenges that assumption.

cancelling an it project

Intel Security to discontinue McAfee SaaS products

Some products will be replaced, but admins will need to start over for setup and configuration.

credit cards

Feud heats up over chip cards, FBI warning

A National Retail Federation attorney said that an updated FBI warning on chip card vulnerabilities waters down the need for PIN security.

Load More