New & Notable
Endpoint security management tools News
November 12, 2014
Dell Software is investing in the cloud, and IT pros weigh in on KACE as a service-based systems management offering.
November 07, 2014
Dell Software outlined its product direction for its broad offerings during the roadmap session but left IT pros wanting to hear more about KACE.
July 22, 2014
Microsoft has acknowledged that users aren't just tied to desktop OSes, shifting its focus to Office 365 and DaaS rather than its Windows strategy.
March 25, 2014
Dell will launch the KACE K1000 v6.0 endpoint systems management appliance in May with a sleeker look, enhanced security and IT controls.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
Our columnist says free alternative browsers such as Google Chrome and Firefox are giving IE a run for its money because they run anywhere and don't rely on mandatory updates. Continue Reading
The number of endpoint security vulnerabilities is daunting, but endpoint admins should first focus on updating patches against Windows malware. Continue Reading
The Microsoft Windows Recovery Environment, or Windows RE, is a simplified, scaled-back version of the Windows operating system that is used to boot the system when Windows 8.x, Windows Server 2012 or Windows Server 2012 R2 can't. Continue Reading
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Tools are now available to IT for a remote wipe of user-owned laptops. But set clear BYOD security policies and inform users. Continue Reading
Client-side extensions could cause a Group Policy object to fail. Fortunately, there are a few different ways to track down Windows GPO settings. Continue Reading
Useful Windows 8 tools include third-party products for launching and uninstalling apps, grabbing screens, and editing PDFs. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
It's all too easy to close a laptop or notebook when stepping away, but there are steps to take if you don't want an automatic Windows 8.1 shutdown. Continue Reading
You may have good reasons to want to control user access to Windows 8 apps. Here's how to disable Windows Store apps with Group Policy Objects. Continue Reading
Windows 8.1 doesn't include Backup and Restore as its predecessors did, so you may have to use Windows 8 File History and other disaster recovery features instead. Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 7 support is ending in 2015, but that doesn't mean troubleshooting is going with it -- in fact, Windows 7 troubleshooting is easier than ever. Continue Reading
A myriad of browser vulnerabilities and attacks pose a constant threat to Internet Explorer security, endpoint computing and software as a service. Continue Reading
In addition to Copy as Path, the third-party Long Path Tool might be helpful for deleting a file or folder whose Windows path is too long. Continue Reading