Quantcast
Browsing all 16 articles
Browse latest View live

7 top considerations for effective endpoint security

 As BYOD continues to grow in popularity, organisations will have to focus more resources on the protection of endpoint devices and the associated risks those devices bring with them. When trying to...

View Article


Bromium and Microsoft work together to create the world’s most secure endpoint

Bromium©, Inc., the pioneer of threat isolation to prevent data breaches, today announced that it is working closely with Microsoft to ensure Bromium micro-virtualisation and Windows 10 work better...

View Article


Kaspersky Lab improves Apple Mac endpoint security for businesses

Macs have around six per cent of the business endpoint market and Mac specific malware is on the increase. In the rapidly evolving world of malware and security, Mac users can no longer afford to be...

View Article

Endpoint Police: The Police Officer

Today, according to the Enterprise Strategy Group, as much as 50 per cent of corporate data is created, stored and transmitted on mobile endpoint devices. While datacentre security remains important,...

View Article

Poor endpoint security is putting companies at risk

Today Promisec, a firm specialising in endpoint security solutions, has announced the results of its survey of IT security professionals. [see_also] The results of the survey concluded that endpoint...

View Article


Bromium launches next generation endpoint protection

Endpoint systems often represent the weakest element in the security of any corporate network. In order to guard against attacks, protection specialist Bromium is launching the latest version of its...

View Article

Malwarebytes launches enterprise endpoint detection platform

Traditional endpoint security often ends up generating lots of false alerts which take up valuable support time to investigate and resolve. Anti-malware specialist Malwarebytes is aiming to make things...

View Article

Image may be NSFW.
Clik here to view.

Cyber threats more global and dynamic than ever

Signature-based security could be virtually useless as 97 per cent of malware is unique to a specific endpoint, says a new report. This is among the findings of the latest annual Webroot Threat Brief...

View Article


Bromium survey: Endpoints are the worst and security pros are sick of stupid...

Bromium, the micro-virtualisation specialists from California, has just released the results of a survey conducted at RSA 2016 with some surprising results. Users take note! Asking 100 security...

View Article


Half of IT professionals can’t keep up with Enterprise Patching

Tripwire, Inc., a leading global provider of endpoint protection and response, security and compliance and IT operations solutions, today announced the results of an extensive study conducted by...

View Article

Why the trust is broken on BYOD

A study by endpoint security pros Code42 has shown that IT decision makers (ITDMs) are close to losing the trust of workers in the rest of their organisations. 67 per cent of the 1500 knowledge workers...

View Article

Outdated endpoints putting healthcare at risk

Large hospitals often have thousands of workstations used by multiple employees to access confidential patient data, so securing them can be a major challenge. Endpoint security specialist Duo Security...

View Article

The current state of healthcare endpoint security

Securing endpoints in the healthcare industry can be challenging. Large hospital systems often have thousands of workstations used by many different employees, in addition to personal and work-issued...

View Article


Disaster looms at the endpoint, is your business next?

Tim, from your company’s human resources department, is working from home today. He receives an email from Debby, his boss, and immediately opens it. It is a request to review a document, with a link...

View Article

Dell launches zero-day protection for thin clients and virtual desktops

Endpoint protection is still vital for enterprises of all sizes. Dell is launching new security products aimed at giving businesses advanced threat prevention for Windows Embedded thin clients and...

View Article


Q&A: Dealing with ransomware and cyber attacks

Stories of security breaches and cyber attacks appear in the news on a weekly basis at the moment, with ransomware currently being one of the most popular methods amongst cyber criminals. [see_also] We...

View Article
Browsing all 16 articles
Browse latest View live