Read more about endpoint security
Bookmark and Share
  • Why endpoint backup is critical

    02.06.2014

    Enterprises are at an increasing risk for data loss due to the growing amount of company data stored on endpoints—the laptops, smartphones, tablets and other devices which reside on the edge of the network.

  • Using ITOA to secure endpoints

    20.05.2014

    Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure – the endpoints and end-user devices – in order to ensure compliance enforcement of corporate security policies and standards.

  • Making the web a safe place to visit

    13.05.2014

    In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about making the web a safe place to visit with the use of isolation technology for preventing malicious content from infecting endpoints.

  • CoSoSys updates Endpoint Protector 4

    29.04.2014

    At Infosecurity Europe 2014 in London today, CoSoSys updated the Endpoint Protector 4 platform, which provides IT administrators with improved Content Aware Protection policies on the management side, as well as the reporting side.

  • Quickly identify and act on endpoint security issues

    28.02.2014

    Promisec announced plans for Promisec Integrity, a series of cloud-based offerings to help small-to-medium enterprise organizations with endpoint security and remediation.




Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //