Endpoint July 24, 2015 Endpoints: The Beginning of Your Defense 3 min read - Every endpoint connected to your system is a point of vulnerability. It takes compromising only one for attackers to infiltrate your entire infrastructure.
Endpoint July 7, 2015 Winning the Three-Legged Race Toward Endpoint Protection 2 min read - When it comes to endpoint protection, most IT security and operations teams function a lot like the pairs in a chaotic three-legged race.
Endpoint March 20, 2015 Endpoint 911: Why Organizations Need Continuous Insight, Accelerated Risk Prioritization and Incident Response 3 min read - By using this five-step process, you can protect your organization's endpoint security, no matter if the endpoints are located on or off the network.
Endpoint March 17, 2015 Is BYOD Starting to Spell Out ‘S-N-A-F-U’ in Enterprise Security? 4 min read - The bring-your-own-device (BYOD) trend is here to stay. Here is how organizations can educate employees and implement top security policies.
Endpoint February 25, 2015 Smart Moves With Refreshing Results: Stanford University, Coca-Cola Stay Secure With IBM Endpoint Manager 3 min read - Stanford University and Coca-Cola both use IBM Endpoint Manager to protect high-value assets and better defend against potential cyberattacks.
Endpoint February 19, 2015 Can You Trust it? Mobile Authentication Must Become Context- and Risk-Aware 3 min read - Organizations' mobile authentication methods must take risk levels and context into account in order to determine whether device access is legitimate.
Endpoint February 6, 2015 Securing Devices, Data and Users: Unified Endpoint Management at IBM InterConnect 2015 2 min read - In the face of quickly evolving technology and increased cybercriminal threats, organizations need to consider using an endpoint management solution.
Endpoint December 4, 2014 Comparing Endpoint Security Compliance Models: Traditional Vs. Continuous 3 min read - As an organization, it can be difficult to decide between traditional, scan-based and continuous, agent-based security compliance models.
Intelligence & Analytics December 3, 2014 Protecting Information Security With a Moat of Intelligence 2 min read - Endpoint security is no longer enough, so instead of a moat surrounding their network, firms need a "moat of intelligence" to detect threats.
Advanced Threats October 22, 2014 Endpoint Security: Is It Time to Bid Farewell to BIOS and Embrace UEFI? 4 min read - As advanced and persistent attacks to endpoint systems increase, we must ask whether we are doing enough to thwart attacks on BIOS and UEFI.