Endpoint security management tools News
October 20, 2016
A more affordable Workspace One bundle with less advanced management capabilities could appease IT pros who view workspace suites as too pricey.
October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
September 26, 2016
The upcoming Windows Defender Application Guard feature in Microsoft's Windows 10 Edge browser will help IT departments protect against malware from compromised websites.
January 12, 2016
As Citrix refocuses on its core offerings, the new XenMobile 10.3 gets the ability to manage desktop and laptop computers in addition to mobile devices.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
LANDesk Workspaces assigns users one of five profiles, including End User and IT Analyst, to deliver different IT resources and apps based on users' roles. Continue Reading
Unified endpoint management (UEM) is an approach to securing and controlling personal computers (PCs), smartphones and tablets in a connected, cohesive manner from a single console. Continue Reading
WMI, Microsoft's implementation of the CIM standard, lets admins use PowerShell commands to view and modify system data and configuration. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With Identity Manager, VMware's identity as a service offering, IT admins can deliver a variety of application types across devices and users can access resources through single sign-on. Continue Reading
Bringing PC and mobile device management under the same umbrella is clutch for IT today. Shops can get that done by picking the right client management tools. Continue Reading
Windows AppLocker lets you use rules to whitelist or block applications based on attributes such as publisher or path, but it's not a comprehensive application control tool. Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
It may seem like hackers use complex methods to bypass Windows desktop security measures, but in reality it's usually simple oversights, such as unpatched software, that let attackers in. Continue Reading
Audit logs can get big and cumbersome, which presents a problem if you need to look at them after a security breach. Only audit what is necessary. Continue Reading
Although PCs and mobile devices perform many of the same tasks, IT administrators often manage them separately, and they use very different tools and approaches. Traditional PC-only management tools are too rigid to impose on mobile devices, and ... Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Managing an eclectic collection of devices is challenging, but IT administrators just need to establish policies and find a mobile device management tool to help enforce them. Continue Reading
Desktop administrators need to know that the rules of endpoint management have changed: It's not all about PCs anymore. Continue Reading
The proliferation of mobile devices in the enterprise presents a number of challenges for desktop administrators. Legacy, PC-oriented approaches to device management are no longer adequate because they treat all devices the same.
There was a ... Continue Reading