Ad Image

The Top 10 Solutions Review Endpoint Security Articles of 2018

2020 SonicWall Cyber Threat Report

The Solutions Review Top 10 Endpoint Security Articles of 2018

With the end of the year truly upon us, the editors at Solutions Review thought now is the time to reflect upon the endpoint security market for enterprises—the research, best practices, and expert reports.

Download Link to Gartner 2018 Magic Quadrant for Endpoint Protection Platforms

Endpoint security occupies an interesting place in modern cybersecurity. Most enterprises think of endpoint security when they think of cybersecurity overall. Yet the prevention paradigm endpoint security once embodied proves no longer adequate in defending against modern cyber attacks. Endpoint security solution providers constantly innovate and expand their capabilities to fit with the growing threat detection paradigm.

Part of our job here at Solutions Review is to demystify this market and make selecting the right solution easier through our extensive endpoint security articles. Thus we would like to present our choices for the Top 10 Endpoint Security Articles of 2018. These endpoint security articles represent some of the best we at Solutions Review do as we dive into a mature and evolving market.

Here are our choices:     

Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?

No list of endpoint security articles would be complete without featuring what might be one of the most popular articles in our archives. This analysis of the Gartner Magic Quadrant delves into the consolidation of endpoint protection platforms and the innovations in endpoint detection and response (EDR). Who made the cut?  

3 Questions on the Internet of Things (IoT) with Mark Cooper of PKI Solutions

Many of our endpoint security articles contain interviews with talented men and women working in the EPP field. Who better than those working on improving on the digital perimeter to offer insights into its strengths and weaknesses? We had plenty of interviews to choose from, but this one with Mark Cooper dives into the dangers the IoT—a porous part of any enterprise network—can present.  

6 Key Capabilities To Consider Before Selecting An Endpoint Security Solution

Our endpoint security articles often go into depth about the individual capabilities solutions can offer. This article serves as more of a summary of what your enterprise should seek out. This can include personal firewall and sandboxing.  

How to Safeguard Your Enterprise with an Incident Response Plan (IRP)

We found numerous themes throughout our research into the endpoint protection market. Enterprises neglecting to have a concrete incident response plan turned out to be one of them. Having an IRP can prove the difference between quickly and professionally remediating a threat and allowing a threat to dwell for months. The choice is yours.  

What Can Cryptojacking Attacks Cost Your Enterprise?

Cryptojacking threats defined 2018 in a way no other cyber attack did. Hackers turned to these subtler, more lucrative threats en masse, supplanting the once-popular ransomware over the course of the year. We wrote several endpoint security articles on this threat. Here’s a favorite of ours.  

The Threats of 2019 With Liviu Arsene of Bitdefender

We wanted to include one more interview; this one focused on what threats enterprises can expect in the coming year. We can’t be one hundred percent sure Liviu Arsene’s predictions will come to pass. However, your enterprise might want to read this article and prepare for the worst. In cybersecurity, over preparation trumps under preparation every time.  

Endpoint Detection and Response: A New Wave in Security?

No technology so embodied 2018 like EDR. Solution providers began to seriously invest in their EDR capabilities or to acquire other solution providers for their EDR. Gartner began to evaluate endpoint security providers by their EDR capabilities. We covered EDR in several endpoint security articles. This one explored the subject at a unique moment: as EDR adoption reached a fever pitch.

5 Signs It’s Time to Replace Your Endpoint Security Solution

A legacy endpoint protection platform can be as much a security risk as having no security whatsoever. Your enterprise might feel comfortable using a solution with which they’re familiar; old habits die hard. Here are five signs that attitude needs to change… and fast.   

The Top Endpoint Security Books You Should Read This Year

What list of our favorite endpoint security articles would be complete without our annual booklist? We delved deep into booksellers’ and experts’ recommendations to develop our own comprehensive booklist. These titles can fill the empty spaces on your bookshelf and in your knowledge.

Sorry, Your Legacy Antivirus Solution is Inadequate

If you are to taking only one thing away from these articles, please let it be this: do not rely on antivirus solutions. Antivirus solutions can’t possibly stand up to modern digital threats. They don’t truly count as part of your digital perimeter. You need endpoint security. Plain and simple.  

Download Link to Endpoint Security Buyer's Guide

Share This

Related Posts

Insight Jam Ad

Insight Jam Ad

Follow Solutions Review