• Solutions Review
    • About Us
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • NEW Endpoint Protection Buyer’s Guide – CLICK HERE!

Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors

Link to Endpoint Security Buyer's Guide

Menu

  • News
  • Best Practices
  • Presentations
  • Best Selling Books
  • Solution Directory
    • Endpoint Security
    • Endpoint Detection and Response
  • Buyer’s Guide
    • Endpoint Security Buyer’s Guide
    • Endpoint Detection Buyer’s Guide
  • Glossary
  • Resources

News

2019-MODDED.jpg

Apple Vulnerability Places All of Apple iOS at Risk

A recently discovered Apple vulnerability put all users of Apple iOS and virtually every Apple device at risk from direct attack without user action.  The …

September 14, 2021Endpoint Security News, Featured Read more
2019-MODDED.jpg

Employee Security Training and Endpoint Security

How do employee security training and endpoint security interact to form a stronger digital perimeter?  Endpoint security represents a crucial part of the …

August 27, 2021Endpoint Security News, Featured Read more
fileless-malware-mod.jpg

Continuing Expert Coverage of the T-Mobile Breach

Solutions Review continues our expert coverage of the T-Mobile breach as the full extent of the situation continues to unfold.  Previously, we covered the …

August 18, 2021Best Practices, Endpoint Security News Read more
MicrosoftTeams-image-21.jpg

The Biggest Endpoint Security News Items During the First Half of 2021

Our editors curated this list of the biggest endpoint security news items during the first half of 2021, as highlighted on Solutions Review. Cybersecurity is …

July 27, 2021Endpoint Security News, Featured Read more
Enterprises-Faced-Over-8-Million-High-Risk-Email-Threats-in-2018-Alone-mod.jpg

Deep Instinct Releases 2021 Mid-Year Threat Landscape Report

Deep Instinct recently released its 2021 Mid-Year Threat Landscape Report. As the name suggests, this report details Deep Instinct’s research into the threat …

July 22, 2021Endpoint Security News, Featured Read more
data-breach-costs-mod.jpg

Sophos Announces Acquisition of Braintrace for NDR Technology

Sophos recently announced its acquisition of Braintrace, a Network Detection and Response (NDR) technology provider.  Sophos develops products for …

July 22, 2021Endpoint Security News, Featured Read more
Home-Office-Second-Mod.jpg

McDonald’s Breach Could Have Been Much Worse

McDonald’s suffered from a data breach, which could have been much worse according to reports. Here’s what we know so far.  Fast-food giant McDonald’s …

June 11, 2021Endpoint Security News, Featured Read more
World-Password-Day-mod.jpg

Key Findings: Verizon’s 2021 Data Breach Investigations Report

Verizon recently released its 2021 Data Breach Investigations Report. This report, its 14th iteration, analyzes 29,207 quality cybersecurity incidents. Of …

May 18, 2021Endpoint Security News, Featured Read more
2020-Press-Release.jpg

Solutions Review Releases New 2021 Buyer’s Guide for Endpoint Detection and Response (EDR)

Solutions Review is proud to release an all-new resource for comparing cybersecurity and endpoint security software, the 2021 Buyer’s Guide for Endpoint …

April 28, 2021Endpoint Security News, Featured, Staff Pick Read more
2019-MODDED.jpg

AT&T Cybersecurity Launches Managed Endpoint Security Solution

AT&T Cybersecurity today announced the launch of a managed endpoint security solution. This solution stems from an alliance with SentinelOne. The AT&T …

April 19, 2021Endpoint Security News, Featured Read more
← Older posts
IAM Solution Suggestion Engine

Featured Video

Download Link to Endpoint Security Buyer's Guide

Top Posts & Pages

  • The 14 Best Endpoint Security for Servers Platforms in 2022
    The 14 Best Endpoint Security for Servers Platforms in 2022
  • What's Changed: 2021 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)
    What's Changed: 2021 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP)
  • The 22 Best Endpoint Security Vendors and Solutions for 2022
    The 22 Best Endpoint Security Vendors and Solutions for 2022
  • What's the Difference Between Antivirus and Endpoint Security?
    What's the Difference Between Antivirus and Endpoint Security?
  • What Should the Future of Penetration Testing Look Like?
    What Should the Future of Penetration Testing Look Like?
  • The Highest-Rated Books for Malware Analysts Available on Amazon
    The Highest-Rated Books for Malware Analysts Available on Amazon
  • Free Endpoint Security Buyer's Guide
    Free Endpoint Security Buyer's Guide
  • 5 Critical Use Cases for EDR (Endpoint Detection and Response)
    5 Critical Use Cases for EDR (Endpoint Detection and Response)
  • 4 Endpoint Security Vendors to Watch in 2022
    4 Endpoint Security Vendors to Watch in 2022
  • Best Endpoint Security Vendors, Companies, Software, Tools | Solutions Review
    Best Endpoint Security Vendors, Companies, Software, Tools | Solutions Review

Download Link to Unified Endpoint Mobility Management Buyer's Guide

Endpoint Security Solutions
Solutions Review brings all of the technology news, opinion, best practices and industry events together in one place. Every day our editors scan the Web looking for the most relevant content about Endpoint Security and Protection Platforms and posts it here.

Related Solutions Review Sites

  • Identity & Access Management
  • SIEM | Information Security
  • Backup & Disaster Recovery
  • Mobile Device Management
  • Wireless Networks
  • twitter
  • facebook
  • linkedin
  • youtube
  • email

Free Endpoint Security Buyer’s Guide

Download Link to Endpoint Security Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - Endpoint Security | Privacy Policy | Do Not Sell My Info | Contact
Top