New & Notable
Endpoint security management tools News
November 12, 2014
Dell Software is investing in the cloud, and IT pros weigh in on KACE as a service-based systems management offering.
November 07, 2014
Dell Software outlined its product direction for its broad offerings during the roadmap session but left IT pros wanting to hear more about KACE.
July 22, 2014
Microsoft has acknowledged that users aren't just tied to desktop OSes, shifting its focus to Office 365 and DaaS rather than its Windows strategy.
March 25, 2014
Dell will launch the KACE K1000 v6.0 endpoint systems management appliance in May with a sleeker look, enhanced security and IT controls.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
Single sign-on lets users skip multiple logins but also threatens Windows 8.1 security. Fix the vulnerability in that OS and Windows Server 2012 R2. Continue Reading
Our columnist says free alternative browsers such as Google Chrome and Firefox are giving IE a run for its money because they run anywhere and don't rely on mandatory updates. Continue Reading
The number of endpoint security vulnerabilities is daunting, but endpoint admins should first focus on updating patches against Windows malware. Continue Reading
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's possible to deploy a Windows service pack with either Group Policy or Windows Server Update Services, but our expert says that one is better. Continue Reading
Windows Defender is included with Windows 8, but it isn't enabled by default, and enterprises will want more third-party antimalware protection. Continue Reading
Tools are now available to IT for a remote wipe of user-owned laptops. But set clear BYOD security policies and inform users. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
The Windows 8 registry is a key component of the OS that admins can use to disable background checks and other activities to make systems run faster. Continue Reading
Windows 8 settings and built-in optimization tools such as Windows 8 Fast Startup can make life easier for Windows 8 and Windows 8.1 admins and users. Continue Reading
Some users have noticed that Windows 8 apps cull personal information and display it in live tiles. See how to change settings to protect your privacy. Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 8 and Windows 8.1 include built-in utilities for improving and maintaining performance. Start with simple Windows 8 disk cleanup practices. Continue Reading
It's all too easy to close a laptop or notebook when stepping away, but there are steps to take if you don't want an automatic Windows 8.1 shutdown. Continue Reading
Windows 7 support is ending in 2015, but that doesn't mean troubleshooting is going with it -- in fact, Windows 7 troubleshooting is easier than ever. Continue Reading