Endpoint Security Webinars

Discover Security Events in Endpoint Security

Get Endpoint Security Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

Endpoint Security: Current Status

Endpoint Security has become increasingly complex and critical as organizations manage diverse device ecosystems spanning traditional workstations, mobile devices, IoT sensors, and cloud workloads. The explosion of remote work and bring-your-own-device policies has expanded the attack surface exponentially, requiring sophisticated protection strategies that extend beyond traditional perimeter defenses.

Evolution to EDR and XDR

The industry has evolved from basic antivirus software to comprehensive Endpoint Detection and Response (EDR) platforms that provide continuous monitoring, threat hunting, and automated response capabilities. Many organizations are now adopting Extended Detection and Response (XDR) solutions that integrate endpoint data with network, email, and cloud telemetry for unified threat detection and response. These platforms leverage behavioral analysis, machine learning, and threat intelligence to identify sophisticated attacks that evade signature-based detection.

Persistent Threat Challenges

Endpoints remain primary targets for ransomware, malware, zero-day exploits, and advanced persistent threats. Attackers increasingly exploit legitimate administrative tools, living-off-the-land techniques, and fileless malware to evade detection. The proliferation of unmanaged and partially managed devices creates visibility gaps and enforcement challenges. Organizations struggle with alert fatigue, skills shortages, and the complexity of managing security across heterogeneous endpoint environments.

Modern Protection Strategies

Contemporary endpoint security strategies employ defense-in-depth approaches combining next-generation antivirus, application control, device encryption, patch management, and privileged access management. Zero-trust principles mandate continuous verification of endpoint posture before granting access to resources. Organizations are implementing unified endpoint management platforms, conducting regular vulnerability assessments, and establishing incident response procedures specifically tailored to endpoint compromise scenarios.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

11th December 2025 | NinjaOne 11.0 Feature Updates: What You Need to Know

This session gives a clear look at the new capabilities in NinjaOne 11.0 and how they strengthen endpoint management and cloud protection. The walkthrough highlights updated features that make device setup easier, expand visibility across environments and improve identity and data safeguards in the cloud.

Attendees will see the new OS deployment options for large scale rollouts, upgraded backup and recovery support for Microsoft Entra and custom SaaS data, and deeper integration with Microsoft Intune for unified oversight. The webinar is designed for teams that want a practical view of how to simplify operations and streamline management with the latest NinjaOne release.

Company_Webinar • Part of NinjaOne

_flag

16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack

This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.

Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.

Company_Webinar • Part of Quokka

_flag

16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise

This session looks at how Apple’s Secure by Design approach is evolving inside the enterprise and why Mac devices are becoming a stronger option for organizations focused on Zero Trust security. The discussion explains how integrated hardware and software protections support modern security outcomes while fitting smoothly into existing enterprise environments and management workflows.

Attendees will hear the key reasons behind rising Mac adoption in large organizations, the challenges teams face when applying Zero Trust principles to Apple endpoints and the innovations that improve security and performance for Mac fleets. The webinar also highlights how Jamf works with Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support enterprise workflows and addresses the most common issues that appear as Mac usage expands.

Company_Webinar • Part of Jamf

_flag

17th December 2025 | Taming Tool Sprawl: How Portnox Unifies Security Through Smarter Integrations

Security teams are facing growing risk as disconnected tools create gaps in visibility and overwhelming alert noise. This webinar examines how Portnox reduces tool sprawl by unifying device intelligence and security controls through smarter integrations, giving teams a clearer and more reliable view of their environment. The session explains why fragmented stacks lead to missed threats and operational blind spots, and how consolidation strengthens overall security posture.

Attendees will see how centralized insights help cut through alert overload, improve detection accuracy and streamline daily workflows. The discussion highlights practical ways to bring order to complex security environments and shows how a unified approach lowers risk while making teams more effective.

Company_Webinar • Part of Portnox

_flag

10th December 2025 | Turn Noise Into Action with Insights Agent

This session gives security teams a clear look at how Insights Agent strengthens real time detection and response across hybrid and multi cloud environments. The discussion explains how attackers move quietly through complex environments and shows how an AI powered security graph helps surface meaningful signals instead of noise. Speakers break down how the agent monitors activity continuously, learns from each event and adapts as new attack patterns emerge.

Attendees will see how the tool turns network behavior into clear, actionable insights that speed up investigation and response. The webinar also covers why AI driven context is essential for identifying lateral movement and how the agent provides guided remediation steps for high risk findings. A live demo will show the technology in action.

Company_Webinar • Part of Illumio

_flag