Endpoint Protection
1 How to use the Buyer's Compass
This KuppingerCole Buyer’s Compass on Endpoint Protection provides information about
- Use Cases
- Functional Selection Criteria
- Non-functional Se ...
2 Market segments defined
This document analyzes the Endpoint Protection market segment. Most anti-malware products provide capabilities to protect against the many types of an ...
Login Free 30-day Select Access Get full Access3 Top 5 Use Cases
The top 5 use cases for ransomware protection are listed in table a.
Use Case | Desciption |
---|---|
Prevent Data Loss | If users’ computer ... |
4 Top 20 Selection Criteria - functional
When looking at products in detail - for instance, during an RFI or RFP - there frequently are hundreds of different criteria to be evaluated. However ...
Login Free 30-day Select Access Get full Access5 Top 10 Selection Criteria - non-functional
Aside from the functional selection criteria listed above, there are a number of non-functional criteria to take into account when deciding on and End ...
Login Free 30-day Select Access Get full Access6 Use Cases / Selection Criteria Matrix
Having identified the most important use cases and selection criteria for vendors in Endpoint Protection, this section provides a matrix that maps use ...
KuppingerCole Advisory Services can support you with adapting criteria to your specific requirements and further services around selecting the appropr ...
Login Free 30-day Select Access Get full Access7 Top 5 Prerequesites - technical
Malware detection and prevention are topics that cannot be seen as isolated from other areas of IT Security. Thus, there are some technical prerequisi ...
Login Free 30-day Select Access Get full Access8 Top 10 Prerequesites - organizational
Success in Endpoint Protection solution rollout depends not only on the technology selected. There are also various organizational prerequisites. The ...
Login Free 30-day Select Access Get full Access9 Top 10 Questions to ask the vendors
Aside from asking for specific features, there are some more questions that are worth asking vendors. The following questions help in understanding th ...
Login Free 30-day Select Access Get full AccessEndnotes
- https://arstechnica.com/information-technology/2017/06/petya-outbreak-was-a-chaos-sowing-wiper-not-profit-seeking-ransomware/
- https://www.eba.europa.eu/documents/10180/1761863/Final+draft+RTS+on+SCA+and+CSC+under+PSD2+%28EBA-RTS-2017-02%29.pdf
- http://shieldfs.necst.it/continella-shieldfs-2016.pdf
- https://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf