Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

AMP and ThreatGrid Integration into Meraki UTMs

A fun overview of Cisco's AMP and Threat Grid technology, a little history, and a look into "Meraki-fying" the technology.


When SD-WAN is more than SD-WAN

SD-WAN has the potential to offer much more than a more manageable network using any choice of connectivity. Is security the next big opportunity for SD-WAN?

biometrics

It’s World Password Day but passwords may be headed for extinction

A range of alternative authentication methods could spell end for passwords

cybersecurity

Security researcher blasts Tizen: 'May be the worst code I've ever seen'

Israeli security researcher criticizes Tizen, a Samsung-backed Android alternative, for its many security flaws.

08 firewall

Face-off: Cisco vs. Fortinet for enterprise firewalls

Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products.

7 encryption

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

iot energy

How to bring true interoperability to the Internet of Things

Multimode radios, software flexibility and hardware-based security allow IoT devices to work in concert in the home.

windows spyware

Appeals court rules Americans have no legal recourse if hacked by foreign governments

An appeals court in Washington, D.C., yesterday upheld a lower court ruling denying an American citizen the right to sue the government of Ethiopia for hacking his home computer.

rsa

Big 3 endpoint vendors battle glitzy startups at RSAC

Three of the original anti-virus vendors – Symantec, McAfee and Trend Micro – were out in full force at the show as well, scoffing at the unproven point products of the startups and touting their own reorganizations, renewed focus and...

iot security

Avaya Surge protects the Internet of Things

Avaya Surge provides elastic, agile IoT device security.

cybersecurity

Nyotron launches to 'secure the world.' Simple, eh?

Nyotron launches PARANOID, a threat-agnostic defense tool to cope with unknown cybersecurity threats.

primary intro
Clear Choice Tests

Review: Threat hunting turns the tables on attackers

For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere...

Load More