Article No. / Date
Articles
ev80139de

Executive View

SentinelOne Singularity Platform

Die integrierte Sicherheitsplattform von SentinelOne kombiniert Präventions-, Erkennungs-, Analyse- und Mitigierungsfunktionen mit dem autonomen KI-Agenten und ermöglicht so tiefe...

ev80139

Executive View

SentinelOne Singularity Platform

SentinelOne’s integrated security platform combines prevention, detection, analysis, and mitigation capabilities with the autonomous AI agent to enable deep visibility and consiste...

ev80192

Executive View

ESET Enterprise Inspector

Enterprise Inspector is ESET’s Endpoint Detection & Response (EDR) solution. It currently runs on Windows with future plans to cover Linux, and Mac clients, collecting and analyzin...

ev80309

Executive View

Cleafy Advanced Threat Detection & Protection

Cleafy is a real-time clientless application risk assessment, threat detection and prevention platform for online services in highly regulated industries. Providing protection agai...

ev80182

Executive View

F-Secure Rapid Detection & Response

Rapid Detection & Response is F-Secure’s Endpoint Detection & Response (EDR) solution. It runs on Windows and Mac clients, collecting and analyzing information to help security ana...

bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

ev80054

Executive View

Akamai Zero Trust Security

Akamai’s Intelligent Edge Platform offers a broad range of access management, threat protection, and application security services that will support you in your journey to Zero Tru...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

ev80004

Executive View

Thycotic Privilege Manager

Besides the fastest growing segment of Privileged Access Management (PAM) market, Endpoint Privilege Management (EPM) has become the most critical technology of PAM that has a dire...

ev79037

Executive View

CipherCloud CASB+

Many organizations are using cloud services, but the use of these services is often poorly governed. Cloud Access Security Brokers (CASBs) provide functionality to discover the use...

ev79056

Executive View

Deep Secure Content Threat Removal Platform

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while elim...

ev79030

Executive View

Cleafy

Cleafy is an integrated real-time clientless threat detection and prevention platform for online services in highly regulated industries, providing protection against advanced targ...

ev70270

Executive View

STEALTHbits® Products Overview

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions...

ev71181

Executive View

SAP Enterprise Threat Detection

In these days of ever-increasing cyber-attacks, organizations have to move beyond preventative actions towards detection and response. This no longer applies to the network and ope...

top