Protect your Network from the Potential Dangers Lurking on Connected Staff Devices

For all your devices –  PC’s, smartphones and tablets.

With all the mobile devices that can now be connected to your network, the network perimeter is no longer defined, making it impossible for centralised security to completely protect all your computers. Endpoint security supplements the centralised security effort, allowing devices to help defend themselves.

You don’t need to sacrifice protection for performance.

Combining a small-footprint antivirus with integrated patch management and Mobile Device Management (MDM), our Premium Endpoint Protection helps take charge of your device security. Our premier mal-ware protection addresses the #1 threat businesses face today – un-patched software – and the biggest disruption to the enterprise IT landscape in more than a decade: the proliferation of mobile devices in the workplace.

Our EndPoint Management includes:

Our premier endpoint protection is optimized to scan for threats quickly, protecting against viruses, spyware, Trojans, rootkits, bots and other malware without draining resources or slowing down machines (even during scans).

Minecraft Education Edition

10 Tips to Stay Safe and Productive While Working from Home

Working from home

The convenience of the digital age keeps us operating and connected. Even as the pandemic has stalled large parts of daily life, an abundance of business and communication continues to persist. Technology provides a workplace at our fingertips. It’s instantaneous, … Read more

Uber comes clean after taking users for a ride over data breach

App-based cab firm Uber has admitted paying $10,000 (£75,500) to cover up a data breach that impacted 2.7 million of its UK users. The company’s database was hacked in 2016, with cybercriminals obtaining access to 57 million names, email addresses … Read more

Hacker accesses prison data to (almost) break someone out

One enterprising scammer has used phishing techniques not to try and get rich quick, but secure a prisoner’s early release. Konrad Voits from Michigan, USA, masterminded an elaborate scheme to try and get a prisoner at Washtenaw County out of … Read more

Android unlock patterns vulnerable to shoulder surfing

Android users could be putting their data at risk by using unlock patterns – which can be guessed by as many as 60% of onlookers. Researchers at the US Naval Academy and the University of Maryland Baltimore County looked into … Read more