Endpoint November 9, 2017 Making the Case for Containment With WIP 3 min read - When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
Endpoint October 9, 2017 Five Key Differences Between Personal and Enterprise Endpoint Security 3 min read - CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Endpoint September 25, 2017 Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks 2 min read - Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
Data Protection September 5, 2017 The Time for IT Asset Management Is Now 3 min read - Due to the rapidly shifting technology landscape, a robust, dynamic and well-funded IT asset management program is a prerequisite to success in business.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
Endpoint June 21, 2017 More Mobile Apps Means More Man-in-the-Middle Attacks 2 min read - Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
Endpoint May 19, 2017 Unapplied Knowledge: Using Endpoint Intelligence to Earn an A-Plus in Security 3 min read - Security professionals can now add the previously unapplied knowledge from IBM BigFix to the existing set of data available through QRadar.
Data Protection May 19, 2017 MaaS360: A GDPR-Ready Unified Endpoint Management Solution 5 min read - MaaS360 helps security analysts assess, update and safely store data to achieve and maintain compliance with the GDPR before it takes effect in May 2018.
Endpoint May 18, 2017 How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks 5 min read - Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.
Artificial Intelligence May 18, 2017 The Road to 2020, Part III: Transforming Your Enterprise With Cognitive UEM 4 min read - The latest UEM and cognitive security offerings enable analysts to effectively collect, collate and analyze what was once an overwhelming volume of data.