Endpoint Security
Latest about Endpoint Security

IDC MarketScape: Worldwide unified endpoint management services
By ITPro published
Whitepaper Make positive steps on your intelligent automation journey

Podcast transcript: Surveying today's threat landscape
By IT Pro published
IT Pro Podcast Read the full transcript for this episode of the IT Pro Podcast

The IT Pro Podcast: Surveying today's threat landscape
By IT Pro published
IT Pro Podcast With an expanding attack surface, can you afford to neglect detection in favour of response?

Ransomware discovered carrying legitimate Windows certificates
By Rory Bathgate published
News Sophos researchers pointed to the sophisticated signatures as a sign of a new, dangerous strategy by a group tied to Cuba

WithSecure Elements Endpoint Protection review: Holistic protection at a great price
By Dave Mitchell published
Reviews Smart cloud-hosted security offering affordable endpoint protection for a wide range of devices at a good price

Hyundai vulnerability allowed remote hacking of locks, engine
By Rory Bathgate published
News Researchers discovered flaws in a number of apps linked to car brands that allowed for personal details and remote control of vehicles using easily-obtained IDs

Avast Premium Business Security review: Feature-rich endpoint management for SMBs
By Dave Mitchell published
Reviews Avast delivers a wealth of tough, easily managed endpoint protection measures at a good price

Magic quadrant for application performance monitoring and observability
By ITPro published
Whitepaper Enabling continuous updating of diverse & dynamic application environments
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.