The Ultimate Guide to Endpoint Protection
2024 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Analyst reports
IDC on EDR
VIPRE Security named 'Major Player' in modern endpoint ...
This month
Frost & Sullivan on EDR
Absolute Software earns top spot in Frost & Sullivan's ...
Last month
IDC on Advanced Persistent Threat Protection
Vectra AI debuts global MXDR for hybrid attack defense
Fri, 16th Feb 2024
FMI on Digital Transformation
VoLTE market to reach US$914.8 billion by 2033: FMI
Wed, 20th Sep 2023
Forrester Research on Advanced Persistent Threat Protection
Cloudflare and IBM work to combat malicious bot traffic
Thu, 10th Aug 2023
Top players
Recent news
About Security Information and Event Management
Fortinet recognised as Challenger in Gartner's 2024 Mag...
Today
About Cloud Services
Keeper Security launches user-friendly passphrase gener...
Yesterday
About Firewall
Report finds 90% of cyber attacks in 2023 exploited RDP
Last week
About Cloud Services
Evergreen acquires Digital Origin in UK managed IT serv...
Last week
About Spyware
ManageEngine integrates Endpoint Central with Check Poi...
Last month
More news
About Cloud Services
NinjaOne & SentinelOne redefine endpoint protection wit...
Wed, 28th Feb 2024
About Cloud Services
Sekuro launches Zero Trust Strategy service on AWS Mark...
Tue, 20th Feb 2024
About Software-as-a-Service
Vectra pioneers global open MXDR service for hybrid att...
Mon, 19th Feb 2024
About Cloud Services
Sekuro first to offer Zero Trust Strategy on AWS Market...
Thu, 15th Feb 2024
About Privacy
Data Privacy Day: Veritas stresses the need for robust ...
Fri, 26th Jan 2024
Even more news
About iOS
Microsoft 365 widens cyber defence with mobile YubiKey ...
Thu, 25th Jan 2024
About Social Media
Rise in Drainer-as-a-Service attacks lead to high-profi...
Fri, 19th Jan 2024
About Cloud Services
AI: The focus of Intel and its partners at CES 24 Intel...
Tue, 16th Jan 2024
About Managed Services
SentinelOne's Singularity Platform secures leadership s...
Fri, 12th Jan 2024
About Awards
Jscrambler triumphs again at 2024 BIG Innovation Awards
Thu, 11th Jan 2024
Job moves
Move at Samsung
HoJin Kim appointed as WatchGuard's SVP & Chief Revenue...
Thu, 6th Apr 2023
Move at Sophos
Sophos named Magic Quadrant Leader, changes up APAC cha...
Mon, 2nd Sep 2019
Move at Veeam
Former Veeam ANZ VP appointed as CrowdStrike APJ sales ...
Tue, 27th Mar 2018
Move at Carbon Black
Marco Corrent appointed to head Carbon Black ANZ channe...
Wed, 30th Aug 2017
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, AI Security, Artificial Intelligence, and Breach Prevention.
Powered by