endpoint

Sophos updates Endpoint Security and Control

Sophos updates Endpoint Security and Control

Sophos has updated the application control features in its Endpoint Security and Control device.
Fiona Raisbeck Sep 26 2007 10:25AM Security
Trend Micro adds host intrusion defence to endpoint offering

Trend Micro adds host intrusion defence to endpoint offering

Anti-Virus company Trend Micro has announced that it will add technology from IPS provider Third Brigade into its current endpoint security product OfficeScan 8,0.
Staff Writers , Fiona Raisbeck Sep 14 2007 9:59AM Security
Novell reaches the endpoint with Senforce acquisition

Novell reaches the endpoint with Senforce acquisition

Open-source software maker and systems configuration manager Novell can add endpoint security to its list of offerings after announcing today that it has acquired Senforce Technologies.
Dan Kaplan Aug 14 2007 1:35PM Security
Symantec integrates technology to boost endpoint security

Symantec integrates technology to boost endpoint security

Symantec has announced the release of its latest security application - five technologies in one.
Negar Salek Jul 5 2007 2:25PM Security
Review: Proventia Desktop

Review: Proventia Desktop

Proventia Desktop focuses on two areas, the first being protection from spyware. This product analyses network downloads to stop the spread of new spyware, and also stops existing spyware from running by stopping unauthorised application communication outside the desktop.
Peter Stephenson,CeRNS, Jun 1 2007 12:00AM Security
Four steps to guard against data leakage from the endpoint

Four steps to guard against data leakage from the endpoint

The influx of inexpensive storage media — from MP3 players and PDAs to USB thumb drives and external hard drives — in today's enterprise facilitates the dissemination of information further and further away from the enterprise core, and attackers are writing increasingly complex, customised malicious code designed to compromise a company's proprietary information.
Dennis Szerszen, May 7 2007 5:11PM Security
Sophos picks up Endforce, adds NAC to endpoint products

Sophos picks up Endforce, adds NAC to endpoint products

Anti-virus vendor Sophos strengthened its hand in the endpoint-security market today through its acquisition of Endforce.
Frank Washkuch Jan 11 2007 5:10PM Security
New endpoint malware detected by experts

New endpoint malware detected by experts

An endpoint security threat that steals sensitive company data from computers has been detected by experts.
Fiona Raisbeck Dec 15 2006 9:03AM Security
Vista validates encryption for mobile and endpoint security

Vista validates encryption for mobile and endpoint security

Long viewed as a major vector for incoming threats such as viruses, malware and worms, organisations are also increasingly viewing laptops as a primary weakness in the fight against the theft, loss and misuse of information.
Nicko van Dec 6 2006 9:57PM Security
Clearing the hurdles to improved endpoint security

Clearing the hurdles to improved endpoint security

Today's workforce is more efficient than ever, utilising communications and storage devices that make the transfer of information fast and convenient. However, the time these tools save can be lost as a result of the data security risks the devices pose for the companies that use them.
Gil Sever, Nov 2 2006 7:08PM Security
Cisco buys endpoint security firm Meetinghouse

Cisco buys endpoint security firm Meetinghouse

Networking giant Cisco Systems announced Thursday that it has acquired endpoint security firm Meetinghouse Data Communications for $43.7 million.
Dan Kaplan Jul 7 2006 8:33PM Security
Review: AppSense Application Manager and Environment Manager

Review: AppSense Application Manager and Environment Manager

The AppSense Application Manager (AM) can be set up as a standalone product in a test environment before actual deployment. The standalone preconfiguration enables an administrator to get to know and tweak the program for the best configuration for each particular environment.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: LANDesk Security Suite

Review: LANDesk Security Suite

This product incorporates all the features of a great endpoint security product in one program. LANDesk must be installed on a central server, which must pass certain security and version tests before install will begin. After installation, policies can be set for access, applications, software versions, service packs, anti-virus, and so on. Agents planted across the network also allow the console administrator to take remote control of machines in violation of policies. Security Suite is part of a larger set of integrated products.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: Safe Access

Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: RFprotect Endpoint

Review: RFprotect Endpoint

Despite the name, this is not similar to the endpoint products in this month’s endpoint security group test, hence its inclusion here on its own.
Jon Tullett Jun 1 2006 12:00AM Security
Controlling the endpoint

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?
Jim Carr Apr 14 2006 8:14PM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organisations.
Alan Bentley Feb 27 2006 11:02AM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 27 2006 1:20PM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 6 2006 12:26PM Security
Industry group releases endpoint security architecture

Industry group releases endpoint security architecture

The Trusted Computing Group, an industry standards body, this week detailed its architecture for ensuring endpoint security and released two interfaces for developers to make products based on the open standard.
Marcia Savage May 5 2005 7:45PM Security

Log In

  |  Forgot your password?