By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Endpoint security management tools News
March 29, 2017
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
January 23, 2017
The Windows 10 Creators Update will provide new settings for users and IT admins to control more of the data the operating system collects and sends back to Microsoft.
October 20, 2016
A more affordable Workspace One bundle with less advanced management capabilities could appease IT pros who view workspace suites as too pricey.
October 06, 2016
Organizations that want to simplify device management and access are interested in workspace suites, such as VMware Workspace One.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
Workspaces promise to make users' lives easier by bringing all of their corporate resources into one place. For IT, new workspace management tools from large vendors aim to ease the administrative burden as well -- allowing management of physical ... Continue Reading
Workspaces give users the data, desktops and apps they need on any device. But too much of a good thing may not be so suite. Continue Reading
Four IT experts sound off on what end-user computing means to them. Continue Reading
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Desktop administrators have been IT department staples for decades, but their jobs and titles are evolving as endpoints move beyond Windows. Continue Reading
Businesses can use IT asset management tools to stay organized with licensing and more. Ivanti's ITAM Suite is one option. Continue Reading
With Identity Manager, VMware's identity as a service offering, IT admins can deliver a variety of application types across devices and users can access resources through single sign-on. Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
Admins can turn to unified endpoint management to wrangle the slew of devices and OSes in their networks. It's important to make sure UEM works with existing systems, though. Continue Reading
Microsoft merged Windows Hello and Microsoft Passport to create Windows Hello for Business, which allows for two-factor authentication and enables single sign-on. Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A Windows audit log can get big and cumbersome, which presents a problem if you need to look at it after a security breach. Only audit what is necessary. Continue Reading
Managing an eclectic collection of devices is challenging, but IT administrators just need to establish policies and find a mobile device management tool to help enforce them. Continue Reading
Desktop administrators need to know that the rules of endpoint management have changed: It's not all about PCs anymore. Continue Reading