The Ultimate Guide to Endpoint Protection
2023 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Top players
Recent news

About ManageEngine
ManageEngine expands EPP with antivirus capability
Last month

About Kaspersky
Kaspersky honoured by Singapore Police for cybercrime e...
Last month

About Android
Group-IB warns of rising Android Trojan threat in APAC
Last month

About Apple
BeyondTrust and Jamf to enhance Mac endpoint security
Mon, 25th Sep 2023

About Lenovo
CyberArk to deliver endpoint security controls for Leno...
Fri, 28th Jul 2023
More news

About Trend Micro
Trend Micro unveils optimised security for endpoints, s...
Fri, 21st Jul 2023

About AZ Asia-Pacific
AZ Asia-Pacific and Absolute Software boost security
Mon, 3rd Jul 2023

About B2B
Report finds 550% jump in unique threats - Cequence Sec...
Wed, 17th May 2023

About Trellix
Trellix announces official launch of Endpoint Security ...
Fri, 5th May 2023

About Microsoft
Eastern Health chooses IGEL to improve endpoint managem...
Thu, 4th May 2023
Even more news

About Jamf
Jamf launches detection and response tool for mobile de...
Wed, 26th Apr 2023

About IGEL Technology
Eastern Health standardises on IGEL OS for clinical sol...
Fri, 21st Apr 2023

About Netskope
Netskope adds Endpoint SD-WAN solution to SASE platform
Fri, 14th Apr 2023

About Managed Services
Huntress brings its cybersecurity expertise to ANZ regi...
Wed, 12th Apr 2023

About Microsoft
1,292 Microsoft vulnerabilities in 2022, according to r...
Thu, 23rd Mar 2023
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, Artificial Intelligence, AI Security, and Breach Prevention.
Powered by