New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Endpoint security management tools News
November 02, 2017
End-user computing technologies can help IT with General Data Protection Regulation compliance, but they aren't up to snuff when it comes to inventorying data.
September 06, 2017
Windows 10 micro-virtualization aims to protect against emerging threats. Microsoft's partner in this initiative, Bromium, says Windows remains IT's biggest security challenge.
May 23, 2017
IT pros need more visibility into what users are doing, and Citrix's new analytics service aims to provide just that.
March 29, 2017
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a non-profit organization that seeks to standardize authentication at the client and protocol layers. Continue Reading
Virtualization-based security (VBS) is technology that abstracts computer processes from the underlying operating system and, in some cases, hardware. Continue Reading
Ivanti is a software company that provides IT management products and services, particularly around endpoint computing. Continue Reading
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft tries to keep Windows 10 safe, but there is still significant room for improvement. Third-party Windows 10 security software may be the missing piece. Continue Reading
Cyberthreats lurk around every corner, so it's always a good time to fortify Windows 10 defenses. These top security tools can help make that happen. Continue Reading
Microsoft's data collection practices in Windows 10 have been under scrutiny since the company released the OS. The Windows 10 keylogger doesn't do much to quell privacy fears. Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
A watering hole attack led to CCleaner malware being installed on millions of systems. Nick Lewis explains how the attack worked and why it should concern enterprises. Continue Reading
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
Desktop administrators have been IT department staples for decades, but their jobs and titles are evolving as endpoints move beyond Windows. Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading
Workspaces promise to make users' lives easier by bringing all of their corporate resources into one place. For IT, new workspace management tools from large vendors aim to ease the administrative burden as well -- allowing management of physical ... Continue Reading
A Windows audit log can get big and cumbersome, which presents a problem if you need to look at it after a security breach. Only audit what is necessary. Continue Reading