Article No. / Date
Articles
lb70336de

Leadership Brief

Schutz gegen Ransomware

Ransomware (Erpressungssoftware) ist eine Epidemie. Prävention ist die beste Strategie. Geben Sie nicht auf und bezahlen Sie kein Lösegeld.

ev79067

Executive View

IBM MaaS360 with Watson

IBM MaaS360 with Watson is an AI-enabled, cloud-based Unified Endpoint Management (UEM) platform designed to enable enterprises to manage and secure smartphones, tablets, laptops,...

bc80213

Buyer's Compass

Endpoint Detection & Response (EDR)

Data loss via Advanced Persistent Threats (APT), Insider Threat, and other vectors remains a top concern of businesses worldwide. EDR tools are becoming more widely used to help de...

lb80235

Leadership Brief

Defending Against Ransomware

Ransomware is an epidemic and continues to evolve. More than half of all companies and other organizations have been attacked with one form or ransomware or another. A multi-layere...

wp72613

Whitepaper

Protecting the keys to your kingdom against cyber-attacks an...

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due...

ev70363

Executive View

BeyondTrust PowerBroker for Unix & Linux

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for...

ev70363de

Executive View

BeyondTrust PowerBroker for Unix & Linux

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowo...

lc71172

Leadership Compass

Enterprise Endpoint Security: Anti-Malware Solutions

This report provides an overview of the market for Enterprise Endpoint Security: Anti-Malware Solutions and provides you with a compass to help you to find the Anti-Malware product...

ev79038

Executive View

ObserveIT Insider Threat Management

ObserveIT Insider Threat Management is a platform that combines the functionality of traditional User Behavior Analytics (UBA) and Data Loss Prevention (DLP) products in a lightwei...

lb79027

Leadership Brief

The Anti-Malware Requirement in PSD2

The Revised Payment Service Directive (PSD2) mandates that service providers evaluate transaction requests for signs of malware infection. In order for transactions to be considere...

ev80181

Executive View

ESET Endpoint Security

ESET Endpoint Security cover the widest variety of endpoint operating systems. This endpoint protection product consistently rates very highly in terms of detection in independent...

lb72574

Leadership Brief

Top Cyber Threats

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using...

lb80186

Leadership Brief

The Differences Between Endpoint Protection (EPP) and Endpoi...

Endpoint Detection & Response products are capturing a lot of mindshare in cybersecurity. But how do they differ from the more standard Endpoint Protection products? We’ll look at...

lb80187

Leadership Brief

Do I Need Endpoint Detection & Response (EDR)?

EDR products are getting a lot of attention at conferences and in the cybersecurity press. But does your organization need it? If so, do you have the expertise in-house to properly...

ev80180

Executive View

Kaspersky Endpoint Security for Business

Kaspersky offers a full-featured Endpoint Security suite which includes one of the most advanced multi-mode anti-malware detection engines in the market, which is powered by their...

an80110

Buyer's Compass

Endpoint Protection

Malware remains a global cybersecurity threat. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements f...

ev80030

Executive View

Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager (HIPAM) is a mature and feature-rich solution for Privileged Access Management (PAM). It covers all major areas of PAM and comes with sophistic...

ev71309

Executive View

Bromium Secure Platform 4.1

Windows endpoint protection from risky tasks and malicious files, through browser and application isolation within one-time disposable micro-virtual machines combined with user beh...

top