endpoint protection

Results 1 - 25 of 170Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Absolute Software
Published By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : 
endpoint protection stategy, byod, workforce mobility, absolute software, own device, access control, application security, email security
    
Absolute Software
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike Falcon Discoveron Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. Youll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
Streamline your endpoint security stack and your team's workload with predictive, AI based, pre-execution malware protection plus prevention based EDR. CylancePROTECT combined with CylanceOPTICS = real-time, predictive threat prevention.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
AV-TEST performed an advanced threat prevention test of enterprise endpoint protection software to evaluate and compare its ability to detect and prevent new and unknown malicious executables.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
" Artificial intelligence and machine learning approaches provide radically new and improved endpoint protection. But not all companies' claims of using machine learning add up to a threat prevention strategy. Know the difference."
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT and CylanceOPTICS v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance position on the Security Value Map (SVM). After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT, and its deployment and configuration services, ThreatZero. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but its occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning what they are and how they work has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
To help you distinguish whether your cybersecurity solution is up to the task, download our infographic. Its a comprehensive reference that will help you ensure that your security protocol is offering true protection for you, your business, and your employees.
Tags : 
    
BlackBerry Cylance
Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Blacks partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities, security
    
CarbonBlack
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. Thats why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations needhybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In todays always on, always connected world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In todays business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Ciscos inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: Decreased incident response time from days to minutes through automation, enabled by the Investigate API Reduction in network security incidents and infected endpoints Increased protection against malware, ransomware, and other threats on and off the network Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
    
Code42
Published By: CommVault     Published Date: Jun 10, 2015
For optimum protection while enhancing user productivity, consider the following features in this buyers guide.
Tags : 
protection, backup, productivity, flexibility, network management, infrastructure, network performance management, storage management
    
CommVault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. Its often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a companys most valuable data even while its potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. Its often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a companys most valuable data even while its potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.