The Ultimate Guide to Endpoint Protection
2023 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Top players
Recent news

About Acronis
Acronis named leader in IDC MarketScape's worldwide cyb...
3 days ago

About ManageEngine
ManageEngine expands EPP with antivirus capability
Wed, 18th Oct 2023

About Kaspersky
Kaspersky honoured by Singapore Police for cybercrime e...
Mon, 16th Oct 2023

About Android
Group-IB warns of rising Android Trojan threat in APAC
Mon, 16th Oct 2023

About Apple
BeyondTrust and Jamf to enhance Mac endpoint security
Mon, 25th Sep 2023
More news

About Lenovo
CyberArk to deliver endpoint security controls for Leno...
Fri, 28th Jul 2023

About Trend Micro
Trend Micro unveils optimised security for endpoints, s...
Fri, 21st Jul 2023

About AZ Asia-Pacific
AZ Asia-Pacific and Absolute Software boost security
Mon, 3rd Jul 2023

About B2B
Report finds 550% jump in unique threats - Cequence Sec...
Wed, 17th May 2023

About Trellix
Trellix announces official launch of Endpoint Security ...
Fri, 5th May 2023
Even more news

About Microsoft
Eastern Health chooses IGEL to improve endpoint managem...
Thu, 4th May 2023

About Jamf
Jamf launches detection and response tool for mobile de...
Wed, 26th Apr 2023

About Citrix
Eastern Health standardises on IGEL OS for clinical sol...
Fri, 21st Apr 2023

About Netskope
Netskope adds Endpoint SD-WAN solution to SASE platform
Fri, 14th Apr 2023

About Managed Services
Huntress brings its cybersecurity expertise to ANZ regi...
Wed, 12th Apr 2023
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, Artificial Intelligence, AI Security, and Breach Prevention.
Powered by