The Ultimate Guide to Endpoint Protection
2023 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Top players
Recent news

About Apple
71,000 customers served by Jamf in managing Apple devic...
Last week

About Absolute Software Corporation
Absolute deepens commitment to public sector with FedRA...
Last month

About Sophos
Sophos earns three AAA awards in SE Labs' security test
Last month

About Ingram Micro
Ingram Micro to distribute The Joy Factory in Australia
Fri, 23rd Dec 2022

About Absolute Software Corporation
Absolute Software named endpoint security vendor to wat...
Fri, 9th Dec 2022
More news

About Sophos
Sophos releases MDR solution in response to increased t...
Wed, 7th Dec 2022

About Hybrid Cloud
Vectra AI launches managed detection and response servi...
Thu, 17th Nov 2022

About Bitdefender
Bitdefender launches chat protection solution to put a ...
Fri, 4th Nov 2022

About Managed Services
CyberCX aims to help AU businesses achieve Essential 8 ...
Thu, 13th Oct 2022

About Windows
ManageEngine unveils MFA for Windows UAC for added secu...
Thu, 13th Oct 2022
Even more news

About Apple
Jamf shows intent to acquire mobile security firm ZecOp...
Fri, 30th Sep 2022

About Breach Prevention
Global retailer overhauls cybersecurity posture with Ch...
Thu, 8th Sep 2022

About Apple
Avast One extends protection with Online Safety Score
Tue, 9th Aug 2022

About Malware
Comodo Security Solutions rebrands, launches new offeri...
Fri, 8th Jul 2022

About Kaspersky
Decline in mobile malware but hackers show growing soph...
Wed, 15th Jun 2022
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, Artificial Intelligence, AI Security, and Breach Prevention.
Powered by