Watch Demo×

See NinjaOne in action!

Endpoint Security

Endpoint Security stands as a critical defense line for any organization. Learn more about the various aspects of securing endpoints – from fundamental principles to advanced tactics. Fortify your network’s endpoints against sophisticated cyber threats, ensuring a secure and resilient IT environment.

What Is RC4 Encryption?

What Is a Certificate Authority (CA)?

What is S/MIME?

What Is Secure Sockets Layer (SSL)?

What Is Session Hijacking & How Does It Work?

What Is a Rootkit & How to Detect It

What Is Malvertising?

What Is a Cloud Access Security Broker (CASB)?

What Is a Computer Worm?

What Is Firewall as a Service (FWaaS)?

What Is an Intrusion Detection and Prevention System (IDPS)?

What Is Personally Identifiable Information (PII)?

What Is an Expansion Bus?

What Is Cryptography?

What Is the WannaCry Ransomware Attack?

What Is Vulnerability Management Detection & Response (VMDR)?

What Is Asymmetric Encryption?

What Is a Data Breach?

What Is GRC (Governance, Risk, and Compliance)?

What Is DNS Spoofing?

What Is Secure Socket Tunneling Protocol (SSTP)?

What Is Secure Hypertext Transfer Protocol (S-HTTP)?

What Is Rogue Security Software?

What Is PPTP (Point-to-Point Tunneling Protocol)?

What Is SQL Injection?

What Is a Macro Virus?

What Is Application Whitelisting?

What Is an Attack Surface?

What Is a Keylogger (KeyStroke Logging)?

What Is Vulnerability Scanning?

What Is RSA SecurID?

What Is PCI Compliance?

What Is Geo-Spoofing?

What Is User and Entity Behavior Analytics (UEBA)?

What Is HTTPS?

What Is Direct Sequence Spread Spectrum (DSSS)?

What Is OpenID Connect?

What Is a Next-Generation Firewall (NGFW)?

What Is Multifactor Authentication (MFA)?

What Is Input Sanitization?

What Is SHA-256?

What Is the CompTIA PenTest+ Certification?

What Is the CRISC Certification?

What Is the Certificate of Cloud Security Knowledge?

What Is Security Information and Event Management (SIEM)?

What Is AdamLocker Ransomware?

What Is Ryuk Ransomware?

What Is REvil Ransomware?

What Is the CISM Certification?

What is WPA2-PSK?

What Is Syslog? Overview & Definition

What Is Cyber Insurance?

What Is CMMC? Overview and Definition

What Is a MPLS VPN?

What Is an SSH Key?

What Is the MFT Protocol?

What Is Privileged Access Management (PAM)?

What Is Identity & Access Management (IAM)?

What Is User Account Control (UAC)?

What Is Meltdown & Spectre?

What Is a Cloud VPN?

What Is a Brute Force Attack?

What Is FTP Anonymous Login?

What Is BadUSB? Definition and How To Prevent It

What Is a VPN Gateway?

What Is IPsec?

What Is Shadow IT?

What Is a Cipher? Definition, Purpose, and Types

What Is SMB (Server Message Block)?

What are Software Restriction Policies (SRP)?

What is an Insider Threat? Definition & Types

What is a Domain Controller?

What Is Cyber Threat Intelligence?

What Is Access Control List (ACL)?

What is an Advanced Persistent Threat (APT)?

What is IT Risk Management?

What is a Virtual Private Network (VPN)?

What is Compliance Management? Definition & Importance

Ready to become an IT Ninja?

Learn how NinjaOne can help you simplify IT operations.