Endpoint security management tools
New & Notable
72-Page PDF: Windows 10 Frequently Asked Questions
In this comprehensive guide, our experts answer the most frequently asked Windows 10 questions ranging from the OS itself, to migration, to user-adoption, and everything in between.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Endpoint security management tools News
-
November 02, 2017
02
Nov'17
GDPR requirements put end-user data in the spotlight
End-user computing technologies can help IT with General Data Protection Regulation compliance, but they aren't up to snuff when it comes to inventorying data.
-
September 06, 2017
06
Sep'17
Endpoint security threats force Windows to adapt
Windows 10 micro-virtualization aims to protect against emerging threats. Microsoft's partner in this initiative, Bromium, says Windows remains IT's biggest security challenge.
-
May 23, 2017
23
May'17
Citrix Analytics Service targets IT security market with AI
IT pros need more visibility into what users are doing, and Citrix's new analytics service aims to provide just that.
-
March 29, 2017
29
Mar'17
Content tracking, analytics hold the key to endpoint data protection
Datacastle CEO Ron Faith points out what some businesses are doing wrong when it comes to handling data, and what they should do differently to track and back up endpoints.
Endpoint security management tools Get Started
Bring yourself up to speed with our introductory content
-
Ivanti
Ivanti is a software company that provides IT management products and services, particularly around endpoint computing. Continue Reading
-
remote desktop protocol (RDP)
Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server. Continue Reading
-
Microsoft Windows Information Protection (WIP)
Windows Information Protection is a feature built into Windows 10 that allows IT shops to control and manage business data separately from personal data on users' devices. Continue Reading
Evaluate Endpoint security management tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Safeguard against threats with third-party Windows 10 security software
Microsoft tries to keep Windows 10 safe, but there is still significant room for improvement. Third-party Windows 10 security software may be the missing piece. Continue Reading
-
Windows 10 security tools to have handy
Cyberthreats lurk around every corner, so it's always a good time to fortify Windows 10 defenses. These top security tools can help make that happen. Continue Reading
-
Windows 10 keylogger adds fuel to the privacy fire
Microsoft's data collection practices in Windows 10 have been under scrutiny since the company released the OS. The Windows 10 keylogger doesn't do much to quell privacy fears. Continue Reading
Manage Endpoint security management tools
Learn to apply best practices and optimize your operations.
-
How can you whitelist apps and fight ransomware with Windows 10 AppLocker?
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
-
How the desktop administrator role is changing
Desktop administrators have been IT department staples for decades, but their jobs and titles are evolving as endpoints move beyond Windows. Continue Reading
-
What IT should expect from unified endpoint management
Admins can turn to unified endpoint management to wrangle the slew of devices and OSes in their networks. It's important to make sure UEM works with existing systems, though. Continue Reading
Problem Solve Endpoint security management tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Clear cached credentials with the cmdkey and PowerShell
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading
-
Workspace management hype vs. reality
Workspaces promise to make users' lives easier by bringing all of their corporate resources into one place. For IT, new workspace management tools from large vendors aim to ease the administrative burden as well -- allowing management of physical ... Continue Reading
-
Why should I limit the number of desktop audit logs?
A Windows audit log can get big and cumbersome, which presents a problem if you need to look at it after a security breach. Only audit what is necessary. Continue Reading

