Home / Endpoint

Endpoint

Most Recent

Unified Endpoint Management (UEM)

As enterprise networks become increasingly distributed with growing numbers of remote workers, unified endpoint management (UEM) has become an important...

Security Breach

Any unauthorized access to a computer network, computer data, devices, or applications is considered a security breach. Typically, a security...

Network Access Control

Network access control is a comprehensive approach to securing all of the places in a network that users can enter....

Data Sanitization

Data sanitization refers to the process of permanently and irreversibly destroying data on a storage device in a deliberate manner,...

Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) is a buzzword created by Gartner to cover hardware and services responsible for ensuring and...

Edge Security

Edge computing security, or simply edge security, refers to the protection of data that resides or moves through devices away...

Multi-Factor Authentication (MFA)

Multi-Factor Authentication, or MFA, is a form of authenticating users that utilizes more than one method of identification when connecting...

Hexadite

Hexadite is the developer of advanced security software that uses artificial intelligence and machine learning to detect and prevent potential...

Microvisor

The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure...

Micro-Virtualization

Micro-virtualization is a technology developed by desktop security firm Bromium to help ensure secure computing environments. Micro-virtualization utilizes a Xen-based...

DLP – data loss prevention

Data loss prevention, or DLP, refers to technology or software developed to protect and prevent the potential for data loss...

Microsoft Safety Scanner

Microsoft Safety Scanner is a free security tool that provides on-demand scanning for viruses, spyware and other malicious software. The...