Lumension Endpoint Security: Device Control and Application Control
By: Lumension View more from Lumension >>
Download this next:
To hack back or not to hack back ...
By: Hewlett Packard Enterprise
Type: eGuide
New deception techniques like “hack back” promise to fool cyber criminals, reduce false positives, and increase visibility over traditional honeypot strategies. They can provide security intelligence that would not be otherwise available.
But deception techniques could instigate the attackers even further. Are your network, your team and your business ready to handle the potential repercussions?
This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
These are also closely related to: "Lumension Endpoint Security: Device Control and Application Control"
-
Bolster signature-based malware detection with machine learning
By: Sentinel Labs, Inc.
Type: eGuide
While signature-based detection is a tried-and-true method for identifying malicious code, it simply can’t keep up with the advanced, metamorphic malware that’s constantly evolving to sneak past defensive measures.
This expert e-guide explores how to improve advanced malware threat detection as well as network and endpoint security. Hear from security experts Michael Cobb and Karen Scarfone about:
- How machine learning improves signature-based detection
- Combining signature-based and anomaly-based behavior detection
- 10 questions to ask endpoint security vendors
- And more
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Choosing an endpoint antimalware protection product can be very difficult.
Inside this e-guide, expert Ed Tittel uncovers strategies and criteria to ensure you are picking the right platform that suits your needs.
Find out key components you should look for, including:
- Antivirus
- Antimalware
- Firewall
- URL blocking
- Phishing protection
Find more content like what you just read:
-
Ensure the security of your endpoint devices: Expert tips
By: Sentinel Labs, Inc.
Type: eGuide
Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
-
Your expert guide to endpoint security
By: Carbon Black
Type: eGuide
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
-
A Computer Weekly Buyer's Guide to Internet of Things Security
By: TechTarget ComputerWeekly.com
Type: eBook
In this 13-page buyer's guide, Computer Weekly looks at how to mitigate the security threats from the IoT, key areas to target, and how to draw up a battle plan.
-
Nokia vs. 18 XDR vendors: Core benefits, features, and XDR maturity
By: NOKIA
Type: Analyst Report
This GigaOm Radar report examines 19 top XDR solutions, comparing their capabilities, emerging AI functions, and business criteria. It provides a forward-looking assessment to help decision-makers evaluate XDR offerings and make informed investments. Read the full report to learn how you can secure remote access and build user trust with XDR.
-
Managed Detection and Response (MDR) Buyer's Toolkit
By: Palo Alto Networks
Type: Buyer's Guide
This MDR Buyer's Toolkit provides a comprehensive guide to selecting the right Managed Detection and Response services. It outlines essential requirements, best practices, and evaluation criteria to help you identify an MDR partner that can meet your organization's security needs. Download the toolkit to get started.
-
IT Automation at a Community Mental-health Center: Case Study
By: Tanium
Type: Case Study
A community mental-health center based in Tulsa supports children and adults across Oklahoma with more than 75 programs. To deliver these services effectively and securely, the agency's IT team must control costs by boosting IT efficiencies and automating as much as possible. In this case study, learn how the team does so with help from Tanium.
-
North-south & east-west traffic
By: Gigamon
Type: Infographic
What encryption technologies are organizations seeing in their networks?While many have already explored the public internet use of SSL/TLS, this research takes a different approach, studying trends in the use of encryption for internal networks and applications. Download the infographic now to unlock the findings of this research.
-
From silos to symphony: XDR and the new age of cyber resilience
By: Bitdefender
Type: eBook
With digital infrastructure expanding and cloud technology continuing to gain traction, the tempo of the security symphony is increasing, as the increased complexity of these modernizations have led to greater risk. Extended detection and response (XDR) solutions present a potential answer to this uptick in risk. Read on to learn more.
-
How NHS Informatics Merseyside gained patch visibility (and a whole lot more) with Tanium
By: Tanium
Type: Case Study
Using a range of third-party applications can be a great idea. But this can also make the challenging task of patching, well, even more challenging! Learn how one large healthcare provider used Tanium to solve their patching visibility challenge and more.
-
The Ultimate Guide to Cyber Hygiene
By: Tanium
Type: White Paper
It’s critical for organizations to deeply understand their risk posture and have tools in place that provide the endpoint visibility and control needed to detect and remediate security breaches. This white paper provides the benchmarks and security strategies that set IT teams up for success in proactively planning defenses against cyber threats.
-
Learn the non-negotiables for an effective EDR solution
By: Palo Alto Networks
Type: Infographic
Today, 81% of businesses have experienced an attack involving some form of malware. Organizations need a solution to combat growing threats, but how do you find effective endpoint security in a market that's flooded with options? Download this infographic to unlock 5 key features of proactive EDR.
-
Explore Kaspersky's Managed Detection and Response Solution
By: Kaspersky
Type: Product Overview
Kaspersky's Managed Detection and Response (MDR) lets MSPs hunt, detect, and respond to threats targeting enterprise customers. With 24/7 monitoring, automated threat hunting, and guided response, Kaspersky MDR helps MSPs tackle security challenges without needing extensive in-house expertise. Read the full datasheet to learn more.
-
Discover Managed Detection and Response Capabilities
By: Palo Alto Networks
Type: White Paper
Palo Alto Networks' Unit 42 Managed Detection and Response (MDR) Service provides 24/7 monitoring, proactive threat hunting, and rapid incident response by security experts. Leverage Cortex XDR's comprehensive visibility and analytics to stop advanced threats across your environment. Read the full datasheet to learn more.
-
Fight modern threats with MDR
By: Palo Alto Networks
Type: Webcast
Threat actors today operate with unprecedented speed. In this webcast, Palo Alto Networks’ Unit 42 Senior Product Marketing Manager, Tanya Wilkins, joins Palo Alto Senior Research Analyst, Kobi Luzner, to discuss managed detection and response (MDR). Watch now to learn more.
-
Power Greater Visibility, More Productivity, and Faster Responses with EDR, NDR, and NGFW Integration
By: Fortinet, Inc.
Type: White Paper
Integrating endpoint detection and response (EDR), network detection and response (NDR), and next-generation firewall (NGFW) technologies can provide security teams with greater visibility, productivity, and faster incident response. Download this white paper to learn how this combined approach can enhance your security operations.
-
Cyberattacks are increasing in speed & sophistication
By: Palo Alto Networks
Type: Video
Modern security teams face a backlog of endless alerts, making it difficult to differentiate between noise and serious threats. Watch this video to see how Palo Alto’s Unit 42 Managed Detection and Response service can bolster your security teams by giving them the added support they need to focus on more important tasks.
-
Top 13 Providers in Endpoint Security and How They Stack Up
By: Bitdefender
Type: Forrester Research Report
As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and a variety of vendors from which to choose. Based on the “must haves” many leaders are looking for in EPP and EDR solutions, discover the top-performing vendors for endpoint security in the last quarter of 2023 in this Forrester report.
-
How to better secure your organization with micro security tech
By: Trend Micro
Type: Case Study
When this leading sustainability organization began to struggle with a rapidly expanding employee base, they sought out a way that they could improve their endpoint security efforts and better protect their assets. Browse this case study to hear the full story.
-
Personalized device threat prevention & visibility into security events
By: JAMF
Type: Blog
Aircall is a cloud-based call center and phone system solution for companies. With devices, specifically macs, playing a crucial role in the worker’s day-to-day operations, endpoint security was a critical necessity. With JAMF, Aircall is able to manage and secure their array of macs, preventing key threats. Read on to learn more.
-
Tanium Converged Endpoint Management: Top 5 business benefits
By: Tanium
Type: Forrester Total Economic Impact Report
Explore quantitative and qualitative benefits identified by the 2024 Forrester Consulting Total Economic Impact™ (TEI) study of the Tanium Converged Endpoint Management (XEM) platform. You’ll learn the cost savings and business benefits experienced by IT and security leaders working in a variety of industries.
-
Texas district boosts IT security & efficiency
By: Fortinet, Inc.
Type: Case Study
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
Your guide to XDR
By: Palo Alto Networks
Type: eBook
Extended detection and response (XDR) is one of the main solutions cybersecurity professionals have turned to deal with the rise in cyberthreats. Read on for a comprehensive breakdown of XDR, what it is, how it works, and what you can do to get the most out of your XDR tools.
-
3 core components of converged endpoint management platforms
By: Tanium
Type: White Paper
The endpoint environment has transformed, but the balance between a superior user experience and effective security still needs better support than ever. But the legacy approach of stitching together different point solutions isn’t working. Discover a new class of converged endpoint platforms for a better breed of IT SecOps.
-
8 Signs You May Be Ready for MDR
By: Palo Alto Networks
Type: White Paper
Unsure if your organization is ready for Managed Detection and Response (MDR) services? This white paper outlines 8 telltale signs that it may be time to consider MDR, such as slow threat response, lack of visibility, and team burnout. Read the full white paper to learn how MDR can enhance your security posture.
-
Improving email and endpoint security while saving time
By: Bitdefender
Type: Case Study
After a close call with a ransomware attack, A-Core Concrete Specialists’ IT team decided they needed a more prepared and mature endpoint and email security operation. By partnering with Bitdefender, A-Core were able to combine several of their offerings and create a more secure operation while saving time and energy. Read on to learn more.
-
EDR vs. MDR vs. XDR: An expert’s guide
By: Hughes Network Systems
Type: Blog
Hackers are not the only ones with evolved tools. Among the most popular mitigation techniques are managed detection and response (MDR), endpoint detection and response (EDR) and extended detection and response (XDR). Read the article now to learn how each is designed to defend against a specific facet of the threat landscape.
-
Benefits of a machine-led, human-powered security platform
By: Palo Alto Networks
Type: eBook
In the last few years, the needs of the security operations center (SOC) have changed, but the tools that they use have not. Extended security intelligence and automation management (XSIAM) uses a combination of automated and human-based controls to more rapidly and accurately remediate threats. Read on to learn more.
-
7 Pillars of Ironclad Endpoint Security
By: Palo Alto Networks
Type: eBook
Discover 7 pillars that compose ironclad endpoint security in this e-book by Palo Alto Networks.
-
Endpoint Protection Buyer's Guide: Critical Capabilities Revealed
By: CrowdStrike
Type: White Paper
Explore the critical capabilities required for modern endpoint protection, including AI-powered prevention, advanced detection and response, identity threat detection, threat intelligence, and managed threat hunting. Download the Endpoint Protection Buyer's Guide to learn how to secure your organization against today's sophisticated threats.
-
How a Nonprofit Ensures Strong Endpoint Security
By: Tanium
Type: Case Study
Secure endpoint devices make it possible for nonprofit International Justice Mission to provide its social-justice services. In this case study, learn how the nonprofit ensures its laptops and other endpoint devices are protected.
-
The Managed Detection & Response Landscape
By: Bitdefender
Type: Forrester Research Report
Organizations of all sizes are turning to managed detection and response (MDR) solutions to quickly handle suspicious activity and contain threats. However, while MDR solutions have been proven, there are a lot of options in the market to choose from which makes picking the right solution for you a challenge. Read on to learn how to choose wisely.
-
Tanium is solving security & operations challenges in ABB Electrification
By: Tanium
Type: Analyst Report
ABB Electrification (EL) is a unit of ABB that operates over 200 manufacturing sites. Understandably, endpoint management and security is of utmost importance for the organization. In this IDC case study, discover how ABB saved 175,000 hours and saw a 243% ROI with a single platform.
-
A Holistic Approach To Security: Endpoint Protection
By: JAMF
Type: Blog
Comprehensive endpoint protection safeguards Apple, Windows, and Android devices against new and evolving threats. Learn how Jamf's defense-in-depth strategy and purpose-built solutions can secure your modern device fleet and mitigate security risks. Read the blog to discover more.
-
Gartner's 2024 Hype Cycle for Endpoint & Workspace Security Insights
By: Tanium
Type: Gartner Research Report
The rapidly evolving cybersecurity landscape demands innovative solutions – and innovation is abundant. Read The Hype Cycle™ for Endpoint and Workspace Security to distinguish between transient trends and real advancements in the endpoint and workspace security arena.
-
Security: The rise of zero trust and AI endpoint tools
By: CBTS
Type: eBook
As the traditional cybersecurity perimeter dissolves, organizations must adopt a zero-trust approach to protect endpoints. This e-book explores the rise of zero trust, the role of AI in endpoint security, and how managed extended detection and response (MXDR) can secure your digital estate. Read the full e-book now to learn more.
-
How Endpoint Privilege Management Fulfills Federal Mandates
By: Merlin International
Type: White Paper
Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
-
Advanced endpoint protection with TeamViewer solutions — Powered by ThreatDown
By: TeamViewer
Type: Product Overview
Protect endpoints from advanced threats with TeamViewer's Endpoint Protection solutions. Powered by ThreatDown, they provide real-time threat detection, remediation, and 24/7 managed security services. Learn more in the product overview.
-
What Constitutes Modern IT Device Management?
By: BlueMantis
Type: Product Overview
What constitutes modern IT device management? To learn about 3 pillars and how to achieve them, tap into this overview.
-
Unify IT Device Management While Enhancing Visibility
By: BlueMantis
Type: Product Overview
As employee devices proliferate, securing and controlling them become more complex for IT teams. One path toward stronger device security, this overview argues, is leveraging Blue Mantis Cloud Endpoint Orchestration. Keep reading to discover 3 benefits that the approach can deliver.
-
Gartner's endpoint protection research - insights for security pros
By: Palo Alto Networks
Type: Gartner Research Report
This in-depth Gartner Research Report evaluates leading endpoint protection platforms, analyzing their ability to execute and completeness of vision. Learn how these vendors stack up in securing endpoints and modernizing security operations. Read the full report.
-
Unify Detection and Response across Your Entire Network with FortiEDR, FortiNDR Cloud, and FortiGate NGFW
By: Fortinet, Inc.
Type: Product Overview
Unify network and endpoint security with FortiEDR, FortiNDR Cloud, and FortiGate NGFW. Gain enriched detections, streamlined investigations, and faster response to stop threats across your environment. Read the white paper to learn more.
-
Detailed threat analysis report from MITRE Engenuity
By: Palo Alto Networks
Type: Research Content
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
-
Cortex XDR: Deliver complete endpoint protection
By: CBTS
Type: Product Overview
In this product overview, you'll discover how Cortex XDR managed by CBTS delivers comprehensive endpoint protection with advanced capabilities like machine learning, based threat detection, automated response, and detailed forensics. Read on now to learn how this solution can enhance your security posture.