Endpoint Security and XDR


35 articles

Endpoint Security and XDR

Detection and response means becoming an active defender

Detection and response means becoming an active defender

Endpoint Security and XDR

Detection and response means becoming an active defender

Operating a detection and response console demands that IT admins adopt an active role in responding to threats.

Rene Holt16 Mar 2023


Endpoint Security and XDR

Free guide: How to set up an effective cybersecurity strategy

Free guide: How to set up an effective cybersecurity strategy

Endpoint Security and XDR

Free guide: How to set up an effective cybersecurity strategy

It is crucial for SMBs to focus on the biggest threats and invest their energy into areas that are substantial for their business continuity.

Editorial Team23 Feb 2023


Endpoint Security and XDR

Protecting small businesses with multiple layers of defense

Protecting small businesses with multiple layers of defense

Endpoint Security and XDR

Protecting small businesses with multiple layers of defense

What technologies and actions should cybersecurity admins at small businesses consider?

Tony Anscombe22 Apr 2022


Endpoint Security and XDR

Firewall: Why use it to protect your business?

Firewall: Why use it to protect your business?

Endpoint Security and XDR

Firewall: Why use it to protect your business?

Developed in the late 1980s, a firewall was one of the first security measures protecting internet users. But how, exactly, do they work?

Editorial Team07 Apr 2022


Endpoint Security and XDR

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

Endpoint Security and XDR

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

ESET security teams' findings suggest that ESET Enterprise Inspector deployed on exploited servers can cut investigation time by at least 80%.

Rene Holt22 Nov 2021


Endpoint Security and XDR

How to plan a secure hybrid workplace

How to plan a secure hybrid workplace

Endpoint Security and XDR

How to plan a secure hybrid workplace

Hybrid work is here to stay — but are your systems ready? Explore how IT admins can build secure, efficient workplaces in a post-pandemic world.

Editorial Team16 Nov 2021


Endpoint Security and XDR

Illicit cryptomining. How can cybercriminals misuse your devices?

Illicit cryptomining. How can cybercriminals misuse your devices?

Endpoint Security and XDR

Illicit cryptomining. How can cybercriminals misuse your devices?

How can you prevent cryptominers from getting into your network? And why should you even care?

Editorial Team03 Nov 2021


Endpoint Security and XDR

Do Apple’s macOS devices need security software?

Do Apple’s macOS devices need security software?

Endpoint Security and XDR

Do Apple’s macOS devices need security software?

Is Apple's macOS as bulletproof as they say?

Editorial Team14 Oct 2021


Endpoint Security and XDR

Choosing endpoint protection: Here's what to consider

Choosing endpoint protection: Here's what to consider

Endpoint Security and XDR

Choosing endpoint protection: Here's what to consider

Pick an endpoint security a solution that's reliable, doesn´t interfere with your systems, and lets you focus on your daily business.

Editorial Team16 Aug 2021