The Ultimate Guide to Endpoint Protection
2025 edition
Overview
In networking, endpoints are the devices in the hands of people – sometimes literally, in the case of smartphones and tablets – but also include laptops, desktops, printers and any other connected device you might directly use. Endpoint protection describes the security services which prevent hackers from compromising these devices and typically includes monitoring, malware protection, data encryption, and firewalling.
Analyst reports
CONTEXT on SaaS
European cybersecurity market sees 2% growth in 2024
Today
Gartner on Cloud Security
SentinelOne honoured as 2024 Gartner Customers' Choice
This month
Gartner Peer Insights on UC
SentinelOne ranks 145th on Deloitte's Fast 500 List
Wed, 27th Nov 2024
Gartner Peer Insights on Firewalls
WatchGuard wins TrustRadius awards for cybersecurity
Fri, 8th Nov 2024
Gartner on UC
CrowdStrike & Fortinet partner to enhance cybersecurity
Wed, 23rd Oct 2024
Expert columns
By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Last month
By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024
By Steve Moros of Proofpoint
The insider threat: Why Australian businesses are most ...
Wed, 25th Sep 2024
By Brad Pulford of HP ANZ
A new kind of PC is coming: From personal computer to i...
Wed, 24th Jan 2024
Top players
Recent news
About Malware
Cybercriminals exploiting AI to enhance attack methods
Last week
About Threat intelligence
CrowdStrike launches new service to combat insider thre...
Last week
About Cloud Services
Juniper Networks boosts ASTRON's LOFAR telescope power
Last week
About Data Protection
Trend Micro partners with Intel for enhanced malware de...
Last week
About Cloud Security
WatchGuard acquires ActZero to boost cybersecurity serv...
This month
More news
About Productivity
AMD unveils expanded AI PC processor range for 2025 lau...
This month
About Mobile gaming
AMD & Dell unveil a new lineup of AI-powered PCs
This month
About Transparency
Open source software challenges predicted to continue i...
This month
About Bots
Businesses face $2.58 million in losses per hour from b...
Last month
About Software-as-a-Service
Solace unveils micro-integrations for real-time data fl...
Last month
Even more news
About Government
Open source malware up 156%, Sonatype research shows
Last month
About Firewalls
Southeast Asia sees surge in web threats amid digital s...
Last month
About Malware
Bitdefender offers $1m warranty with MDR services
Fri, 22nd Nov 2024
About Malware
Tenable discovers vulnerabilities in IaC & PaC platform...
Thu, 21st Nov 2024
About Platform-as-a-Service
MSI unveils AI, HPC servers with NVIDIA MGX, Intel Xeon...
Wed, 20th Nov 2024
Job moves
Move at Bitdefender
WithSecure appoints Samantha Cotton as UK & Ireland cha...
Fri, 16th Aug 2024
Move at Samsung
HoJin Kim appointed as WatchGuard's SVP & Chief Revenue...
Thu, 6th Apr 2023
Move at Veeam
Former Veeam ANZ VP appointed as CrowdStrike APJ sales ...
Tue, 27th Mar 2018
Move at Carbon Black
Marco Corrent appointed to head Carbon Black ANZ channe...
Wed, 30th Aug 2017
Other guides
You can read other related guides from Endpoint Detection and Response, Cybersecurity, AI Security, Artificial Intelligence, and Breach Prevention.
Powered by