Discover Security Events in Endpoint Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Endpoint Security has become increasingly complex and critical as organizations manage diverse device ecosystems spanning traditional workstations, mobile devices, IoT sensors, and cloud workloads. The explosion of remote work and bring-your-own-device policies has expanded the attack surface exponentially, requiring sophisticated protection strategies that extend beyond traditional perimeter defenses.
The industry has evolved from basic antivirus software to comprehensive Endpoint Detection and Response (EDR) platforms that provide continuous monitoring, threat hunting, and automated response capabilities. Many organizations are now adopting Extended Detection and Response (XDR) solutions that integrate endpoint data with network, email, and cloud telemetry for unified threat detection and response. These platforms leverage behavioral analysis, machine learning, and threat intelligence to identify sophisticated attacks that evade signature-based detection.
Endpoints remain primary targets for ransomware, malware, zero-day exploits, and advanced persistent threats. Attackers increasingly exploit legitimate administrative tools, living-off-the-land techniques, and fileless malware to evade detection. The proliferation of unmanaged and partially managed devices creates visibility gaps and enforcement challenges. Organizations struggle with alert fatigue, skills shortages, and the complexity of managing security across heterogeneous endpoint environments.
Contemporary endpoint security strategies employ defense-in-depth approaches combining next-generation antivirus, application control, device encryption, patch management, and privileged access management. Zero-trust principles mandate continuous verification of endpoint posture before granting access to resources. Organizations are implementing unified endpoint management platforms, conducting regular vulnerability assessments, and establishing incident response procedures specifically tailored to endpoint compromise scenarios.
All security events are automatically streamed into this table on a daily basis.
11th December 2025 | NinjaOne 11.0 Feature Updates: What You Need to Know
This session gives a clear look at the new capabilities in NinjaOne 11.0 and how they strengthen endpoint management and cloud protection. The walkthrough highlights updated features that make device setup easier, expand visibility across environments and improve identity and data safeguards in the cloud.
Attendees will see the new OS deployment options for large scale rollouts, upgraded backup and recovery support for Microsoft Entra and custom SaaS data, and deeper integration with Microsoft Intune for unified oversight. The webinar is designed for teams that want a practical view of how to simplify operations and streamline management with the latest NinjaOne release.
Company_Webinar • Part of NinjaOne
16th December 2025 | App-Centric Security: How Mobile App Vetting Fits Into Your Security Stack
This session focuses on the security risks that remain inside mobile applications even when organizations rely on MDM and MTD tools. The webinar explains why mobile app vetting has become a necessary layer in enterprise protection and how evaluating apps for security, privacy and compliance issues helps close gaps that traditional controls miss.
Quokka walks through the core elements of an effective app vetting program and shows where this approach fits within a modern security stack without disrupting users. The presentation includes a demo of Q scout and how it integrates with platforms such as Microsoft and Hexnode to support app centric security across the enterprise.
Company_Webinar • Part of Quokka
16th December 2025 | Mac in 2026: Secure by Design Meets the Enterprise
This session looks at how Apple’s Secure by Design approach is evolving inside the enterprise and why Mac devices are becoming a stronger option for organizations focused on Zero Trust security. The discussion explains how integrated hardware and software protections support modern security outcomes while fitting smoothly into existing enterprise environments and management workflows.
Attendees will hear the key reasons behind rising Mac adoption in large organizations, the challenges teams face when applying Zero Trust principles to Apple endpoints and the innovations that improve security and performance for Mac fleets. The webinar also highlights how Jamf works with Microsoft, CrowdStrike, Palo Alto Networks, Zscaler and Okta to support enterprise workflows and addresses the most common issues that appear as Mac usage expands.
Company_Webinar • Part of Jamf
17th December 2025 | Taming Tool Sprawl: How Portnox Unifies Security Through Smarter Integrations
Security teams are facing growing risk as disconnected tools create gaps in visibility and overwhelming alert noise. This webinar examines how Portnox reduces tool sprawl by unifying device intelligence and security controls through smarter integrations, giving teams a clearer and more reliable view of their environment. The session explains why fragmented stacks lead to missed threats and operational blind spots, and how consolidation strengthens overall security posture.
Attendees will see how centralized insights help cut through alert overload, improve detection accuracy and streamline daily workflows. The discussion highlights practical ways to bring order to complex security environments and shows how a unified approach lowers risk while making teams more effective.
Company_Webinar • Part of Portnox
10th December 2025 | Turn Noise Into Action with Insights Agent
This session gives security teams a clear look at how Insights Agent strengthens real time detection and response across hybrid and multi cloud environments. The discussion explains how attackers move quietly through complex environments and shows how an AI powered security graph helps surface meaningful signals instead of noise. Speakers break down how the agent monitors activity continuously, learns from each event and adapts as new attack patterns emerge.
Attendees will see how the tool turns network behavior into clear, actionable insights that speed up investigation and response. The webinar also covers why AI driven context is essential for identifying lateral movement and how the agent provides guided remediation steps for high risk findings. A live demo will show the technology in action.
Company_Webinar • Part of Illumio