The Ultimate Guide to Endpoint Protection
2024 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Analyst reports
Gartner on SIEM
CrowdStrike leads Gartner Magic Quadrant for endpoint p...
Last month
Gartner on EDR
SentinelOne leads 2024 Gartner Magic Quadrant for EPP a...
Last month
IDC on Malware
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Gartner on Firewalls
Gartner names Cato Networks as Leader in 2024 SASE Quad...
Thu, 11th Jul 2024
IDC on Malware
Acronis launches comprehensive XDR solution for MSPs
Thu, 13th Jun 2024
Reviews
Gaming
Hands-on review: Asus Zenbook S 16 with AMD Ryzen AI 9 ...
Thu, 22nd Aug 2024
Gaming
Hands-on review: ASRock Phantom Gaming Z790 Nova WiFi m...
Wed, 24th Jan 2024
Gadgets
Hands-on review: Intel NUC 12-PRO Wall Street Canyon
Tue, 23rd Jan 2024
PC Hardware
Hands-on review: Intel Core i9-14900K and Intel Core i5...
Tue, 28th Nov 2023
Expert columns
By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Last month
By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Last month
By Brad Pulford of HP ANZ
A new kind of PC is coming: From personal computer to i...
Wed, 24th Jan 2024
By Graham Hawkey of Osirium
How stronger endpoint control protects systems and data
Thu, 26th Oct 2023
Top players
You can read more from the top players CrowdStrike, Carbon Black, Trend Micro, Sophos, and SentinelOne.
Recent news
About Software Updates
WatchGuard reveals Q2 2024 cyber threat trends report
Yesterday
About Malware
WatchGuard reveals new malware trends in Q2 2024 report
2 days ago
About Ransomware
Forescout discovers security flaws in DrayTek routers
Last week
About Malware
Halcyon unveils Linux-focused anti-ransomware solution
Last week
About DataCentre infrastructure
MSI launches new server platforms with Intel Xeon proce...
Last month
More news
About Software-as-a-Service
IGEL unveils new service to recover from cyber attacks ...
Last month
About Malware
Fake human verification pages spread Lumma Stealer malw...
Last month
About Productivity
MathWorks launches new support package for Qualcomm Hex...
Last month
About Cloud Services
Lenovo & SentinelOne team up to boost global PC securit...
Last month
About Collaboration
LG AI Research & Google Cloud expand AI collaboration
Thu, 29th Aug 2024
Even more news
About Cloud Services
Intel expands Xeon processor family for professional cr...
Thu, 29th Aug 2024
About Malicious Insiders
CrowdStrike report reveals rise in cyber threats & intr...
Wed, 21st Aug 2024
About Cyber Threats
SentinelOne & Google Cloud strengthen cyber defence col...
Tue, 13th Aug 2024
About Ransomware
Ransomware causes revenue loss for 47% of UK energy fir...
Fri, 9th Aug 2024
About Cloud Services
Average cost of an Australian data breach hits AUD $4.2...
Fri, 2nd Aug 2024
Job moves
Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024
Move at Samsung
HoJin Kim appointed as WatchGuard's SVP & Chief Revenue...
Thu, 6th Apr 2023
Move at Veeam
Former Veeam ANZ VP appointed as CrowdStrike APJ sales ...
Tue, 27th Mar 2018
Move at Carbon Black
Marco Corrent appointed to head Carbon Black ANZ channe...
Wed, 30th Aug 2017
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, AI Security, Artificial Intelligence, and Breach Prevention.
Powered by