Endpoint Protection

Endpoint Protection and Security

AMP and ThreatGrid Integration into Meraki UTMs

A fun overview of Cisco's AMP and Threat Grid technology, a little history, and a look into "Meraki-fying" the technology.

When SD-WAN is more than SD-WAN

SD-WAN has the potential to offer much more than a more manageable network using any choice of connectivity. Is security the next big opportunity for SD-WAN?


biometrics

It’s World Password Day but passwords may be headed for extinction

A range of alternative authentication methods could spell end for passwords

cybersecurity

Security researcher blasts Tizen: 'May be the worst code I've ever seen'

Israeli security researcher criticizes Tizen, a Samsung-backed Android alternative, for its many security flaws.

08 firewall

Face-off: Cisco vs. Fortinet for enterprise firewalls

Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products.

7 encryption

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

iot energy

How to bring true interoperability to the Internet of Things

Multimode radios, software flexibility and hardware-based security allow IoT devices to work in concert in the home.

windows spyware

Appeals court rules Americans have no legal recourse if hacked by foreign governments

An appeals court in Washington, D.C., yesterday upheld a lower court ruling denying an American citizen the right to sue the government of Ethiopia for hacking his home computer.

rsa

Big 3 endpoint vendors battle glitzy startups at RSAC

Three of the original anti-virus vendors – Symantec, McAfee and Trend Micro – were out in full force at the show as well, scoffing at the unproven point products of the startups and touting their own reorganizations, renewed focus and...

iot security

Avaya Surge protects the Internet of Things

Avaya Surge provides elastic, agile IoT device security.

cybersecurity

Nyotron launches to 'secure the world.' Simple, eh?

Nyotron launches PARANOID, a threat-agnostic defense tool to cope with unknown cybersecurity threats.

primary intro
Clear Choice Tests

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

information security

Looking to 2017: It’s not just enterprise security

Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse.

041916aruba sign

Aruba flexes some IoT muscle

Aruba’s new products, including ClearPass Universal Profiler and the new 2540 series switch, position the company as an IoT enabler.

06 bank accounts atm

Advice for evading ATM skimmers

I cannot use an ATM these days without wondering if I am getting ripped off by a stealthy skimming device that has been placed inside the machine’s card slot.

cybersecurity ts

Residential routers easy to hack

Home routers are flawed and vulnerable to being hacked, claims security firm ESET.

ddos

Media fails to tell consumers about device flaws in Friday’s internet outage

When reporting on Friday’s DDoS attack, the national media should have warned consumers not to install internet-connected devices that have a 4-year-old flaw.

analytics network monitoring

GuardiCore helps security teams see into apps and networks before they segment

GuardiCore Reveal lets security teams discover, monitor and visualize activity inside applications and networks, as well as control traffic through micro-segmentation policies.

fort gun defense cyber protection
Clear Choice Tests

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line.

cloud building security

IoT security guidance emerges

A new report from the Cloud Security Alliance offers advice on how to secure IoT devices from inception.

Load More