endpoint security
USBGuru simulated attack service
Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware. USBGuru is a …
DellKACE unveils appliance for improved endpoint security
Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …
Comodo updates its Endpoint Security Manager
Comodo released a new edition of Comodo Endpoint Security Manager designed to assist businesses with locking down and centrally managing their laptop, desktop and server …
Wave Endpoint Monitor detects anomalous behavior
Wave Systems announced Wave Endpoint Monitor (WEM), a solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM …
Sophos delivers complete security in a box
Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …
Nominum releases mobile security solution
Faster mobile networks, explosive consumer demand, more powerful smartphones, and the influx of non-handset mobile-ready devices make mobile networks an attractive option for …
Secure USB desktop environment for the enterprise
Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …
Hardening the endpoint operating system
Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …
A platform to stop APTs and malware
Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus …
Webroot delivers endpoint protection
The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent …
Endpoint security through whitelisting
The latest release of McAfee Application Control is integrated with McAfee Global Threat Intelligence to show the file reputation of every file in the enterprise. This feature …
Windows 8 will have picture password sign in
As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does