• Solutions Review
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • NEW Endpoint Protection Buyer’s Guide – CLICK HERE!

Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors

Link to Endpoint Security Buyer's Guide

Menu

  • News
  • Best Practices
  • Presentations
  • Best Selling Books
  • Solution Directory
    • Endpoint Security
    • Endpoint Detection and Response
  • Buyer’s Guide
    • Endpoint Security Buyer’s Guide
    • Endpoint Detection Buyer’s Guide
  • Glossary
  • Resources

Data Breaches

World-Password-Day-mod.jpg

Key Findings: Verizon’s 2021 Data Breach Investigations Report

Verizon recently released its 2021 Data Breach Investigations Report. This report, its 14th iteration, analyzes 29,207 quality cybersecurity incidents. Of …

May 18, 2021Endpoint Security News, Featured Read more
fileless-malware-mod.jpg

Kia Motors America Suffers $20 Million Ransomware Attack: Expert Commentary

Kia Motors America disclosed suffering a ransomware attack demanding $20 million for the decryption code and to avoid a data leak. The DoppelPaymer gang …

February 18, 2021Best Practices, Featured Read more
World-Password-Day-mod.jpg

How Do Malware Breaches Actually Occur?

How do malware breaches actually occur? Here at Solutions Review, we write about how your enterprise can protect itself against malware, ransomware, and data …

October 23, 2020Best Practices, Featured Read more
healthcare-identity.jpg

When is a Data Breach Not? The WHO and Gates Foundation Compromises

Recently, the World Health Organization (WHO) and other healthcare organizations have reported multiple cyberattacks. So far, the WHO remains largely …

April 24, 2020Best Practices, Featured Read more
IAM-CEO-mod.jpg

Expert Commentary on the Capital One Data Breach

Today, the cybersecurity world became rocked once again in the wake of a new devastating data breach. This time, it was Capital One—major bank and credit …

July 30, 2019Best Practices, Featured Read more
CRN-SIEM-MOD.jpg

Data Breach Preparation Best Practices for Businesses

How should your enterprise focus its data breach preparation efforts? What data breach preparation best practices should your business follow? Sadly, no breach …

February 20, 2019Best Practices Read more
Endpoint-security-Mod-2.jpg

What Was the Worst Breach of 2018? Our 5 Choices

After 2017 proved to be the year of the data breach, cybersecurity experts experienced a sort of cognitive dissonance. 2018 couldn’t possibly suffer the same …

December 27, 2018Best Practices Read more
data-breach-costs-mod.jpg

IBM: Average Data Breach Now Costs $3.9 Million

Yesterday, the Ponemon Institute released the results of a study sponsored by IBM — the 2018 Cost of a Data Breach Study. The findings from this report paint …

July 12, 2018Endpoint Security News Read more
oie_25174516AQKU5XXW.jpg

Live from the 2018 Identiverse Conference in Boston, MA (Tuesday)

7:34 Good morning! Once again, Solutions Review is coming to you live from the Identiverse Conference at the Hynes Convention Center in Boston, MA! The …

June 26, 2018Best Practices Read more
epidemic-mod.jpg

4 Questions on Data Breaches with Maxim Emelianov of HostForWeb

Every day. It feels like every day there are yet more headlines of major enterprises or institutions suffering devastating data breaches. It can make any IT …

February 27, 2018Best Practices Read more
← Older posts
IAM Solution Suggestion Engine

Featured Video

Udacity Cybersecurity Ad

Download Link to Endpoint Security Buyer's Guide

Top Posts & Pages

  • What's Changed: 2021 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)
    What's Changed: 2021 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)
  • The 22 Best Endpoint Security Vendors and Solutions for 2022
    The 22 Best Endpoint Security Vendors and Solutions for 2022
  • What's the Difference Between Antivirus and Endpoint Security?
    What's the Difference Between Antivirus and Endpoint Security?
  • The Top 11 Types of Endpoint Security for Enterprises
    The Top 11 Types of Endpoint Security for Enterprises
  • The Best Endpoint Security Vendors for Enterprises
    The Best Endpoint Security Vendors for Enterprises
  • The Highest-Rated Books for Malware Analysts Available on Amazon
    The Highest-Rated Books for Malware Analysts Available on Amazon
  • Best Endpoint Security Vendors, Companies, Software, Tools | Solutions Review
    Best Endpoint Security Vendors, Companies, Software, Tools | Solutions Review
  • 5 Critical Use Cases for EDR (Endpoint Detection and Response)
    5 Critical Use Cases for EDR (Endpoint Detection and Response)
  • 4 Endpoint Security Vendors to Watch in 2022
    4 Endpoint Security Vendors to Watch in 2022
  • The 22 Best Endpoint Security Companies for 2020
    The 22 Best Endpoint Security Companies for 2020

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Endpoint Security and Protection Platforms and posts it here.

Related Solutions Review Sites

  • Identity & Access Management
  • SIEM | Information Security
  • Backup & Disaster Recovery
  • Mobile Device Management
  • Wireless Networks
  • twitter
  • facebook
  • linkedin
  • youtube
  • email

Free Endpoint Security Buyer’s Guide

Download Link to Endpoint Security Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Endpoint Security | Privacy Policy | Do Not Sell My Info | Contact
Top