• Solutions Review
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • NEW Endpoint Protection Buyer’s Guide – CLICK HERE!

Best Endpoint Security Protection Software and Vendors

Link to Endpoint Security Buyer's Guide

Menu

  • News
  • Best Practices
  • Presentations
  • Best Selling Books
  • Solution Directory
  • Buyer’s Guide
  • Glossary
  • Resources

Jeff Edwards

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
security-265130_1280.jpg

5 Alternatives to The Gartner Magic Quadrant for Endpoint Protection

Gartner is one of the loudest voices in enterprise technology— they’re world’s largest information technology research and advisory company, and …

October 4, 2017Best Practices, Featured Read more
CISO-roundtable-cover.jpg

CISO Roundtable: Stopping Breaches at the Endpoint

Endpoint protection solutions are an essential part of the enterprise security toolkit, but they’re quickly becoming some of the most complex products on the …

September 27, 2017Presentations Read more

FireEye Announces General Availability of FireEye Endpoint 4.0

FireEye has announced the general availability of FireEye® Endpoint 4.0, the latest version of the company’s flagship FireEye Endpoint platform, which …

September 26, 2017Endpoint Security News Read more
startrek-tng.jpg

What Makes Your Security So “Next-Gen,” Anyway?

As companies strive to remain competitive in the cybersecurity market, you’ll see major endpoint protection providers reinventing their brand and developing …

September 21, 2017Best Practices Read more
security-265130_1280.jpg

17 Security Blogs You Should Be Reading in 2017

Information security is one of the most important areas in enterprise IT today, and it’s only becoming more prominent as large-scale breaches of corporate …

September 14, 2017Best Practices Read more
equifax-headquarters-fuckers.jpg

The Equifax Hack: What You Need to Know

Another day, another data breach. As you’ve probably heard by now, credit-monitoring firm Equifax has been breached, exposing the records of up to 145 …

September 12, 2017Endpoint Security News Read more
sentinelOneDog.jpg

SentinelOne Introduces ‘Deep Visibility Module’ for IOC Search and Threat Hunting on the Endpoint

SentinelOne has launched a new Deep Visibility module for the SentinelOne Endpoint Protection Platform (EPP), offering new search capabilities for all …

September 8, 2017Endpoint Security News Read more
2016topInfosecevents.jpg

‘Can’t Miss’ InfoSec Events for Fall/Winter ’17

Information security is one of the most important areas in enterprise IT today, and it’s only becoming more prominent as large-scale breaches of corporate …

August 30, 2017Best Practices, Endpoint Security News Read more
gartner-office.jpg

Security Spending to hit $93B by 2018, Gartner Says

Analyst and research house Gartner, Inc., purveyors of the popular Magic Quadrant for SIEM, have released their latest spending forecast for the global …

August 24, 2017Endpoint Security News Read more
markets-generic.jpg

Top 10 Endpoint Security Vendors in the Cybersecurity 500

Cybersecurity research and market intelligence firm Cybersecurity Ventures has released the latest iteration of its Cybersecurity 500 list, a global …

August 21, 2017Endpoint Security News Read more
← Older posts
Newer posts →

Featured Video

Download Link to Endpoint Security Buyer's Guide

Top Posts & Pages

  • The 22 Best Endpoint Security Companies for 2020
    The 22 Best Endpoint Security Companies for 2020
  • The Top 11 Types of Endpoint Security for Enterprises
    The Top 11 Types of Endpoint Security for Enterprises
  • What's the Difference Between Antivirus and Endpoint Security?
    What's the Difference Between Antivirus and Endpoint Security?
  • Solutions Review: 5 Vendors to Watch in Endpoint Security 2021
    Solutions Review: 5 Vendors to Watch in Endpoint Security 2021
  • The Gartner 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?
    The Gartner 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?
  • Ten Endpoint Security Vendors to Watch in 2020
    Ten Endpoint Security Vendors to Watch in 2020
  • Free Endpoint Security Buyer's Guide
    Free Endpoint Security Buyer's Guide
  • SIEM vs EDR: Which One Does Your Business Need?
    SIEM vs EDR: Which One Does Your Business Need?
  • 2021 Predictions: The Year of Malicious Automation by Brad LaPorte
    2021 Predictions: The Year of Malicious Automation by Brad LaPorte
  • The 25 Best Endpoint Security Platforms and Tools of 2018
    The 25 Best Endpoint Security Platforms and Tools of 2018

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Endpoint Security and Protection Platforms and posts it here.

Related Solutions Review Sites

  • Identity & Access Management
  • SIEM | Information Security
  • Backup & Disaster Recovery
  • Mobile Device Management
  • Wireless Networks
  • twitter
  • facebook
  • linkedin
  • youtube
  • email

Free Endpoint Security Buyer’s Guide

Download Link to Endpoint Security Buyer's Guide
© 2012-2020 Solutions Review. All rights reserved.
Solutions Review - Endpoint Security | Privacy Policy | Do Not Sell My Info | Contact
Top
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok