Endpoint Security—When Less Means More

Nearly 60 years after it was authored by Intel co-founder Gordon Moore, Moore’s law is still relevant even beyond the world of semiconductors. You’re probably already familiar with his observation from 1965, regarding the empirical relationship of experience to gains in production. It stated that the number of transistors on an integrated circuit would [...]

The Remote Workforce Sprint Is Now a Marathon. Is Your Security Ready?

Organizations everywhere sprinted to establish work-from-home (WFH) access in the last few months as the global pandemic impacted our everyday life. Continued uncertainty means that supporting and securing that remote workforce is now looking more like a marathon. The changing face of work In a recent poll of over 2,000 HR leaders, approximately 17% responded [...]

Legacy to Next-gen: Evaluating Your Endpoint Security

Protecting endpoints against evolving threats is challenging. Malware is getting more and more evasive. Endpoints are gaining in volume, disparity, and distance from your data center. Your legacy anti-virus (AV) is no longer up to the task. Leaving legacy behind Signature-based methodologies are outdated. Developed and iterated since the 1980s, this is the best-understood method [...]

Go to Top