Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

The 2017 Tech Innovator Awards

The ability to translate a future-facing view of technology into reality today is the crowning achievement of this year's Tech Innovator winners. Here's who has provided that spark this year.

Back 1 ... 41   42   43   44   45   ... 62 Next




CrowdStrike Falcon Platform

Recent enhancements to CrowdStrike's flagship Falcon offering add new capabilities for machine learning and advanced endpoint protection. New features include CrowdStrike Falcon Prevent for behavioral analytics-based anti-virus replacement, as well as CrowdStrike Falcon Discover for monitoring of privileged user accounts and application usage.

CylanceProtect Home Edition

Though targeted at consumer security with features such as artificial intelligence to block unknown variants of malware, CylanceProtect Home Edition is sold through the channel with the same margin structure as the CylanceProtect corporate version, according to Cylance. That gives partners a broader portfolio to offer to customers from Cylance, the company said.

McAfee Dynamic Endpoint Threat Defense

With Dynamic Endpoint Threat Defense, McAfee provides a comprehensive context of potential threats along with single-click remediation. The offering uses insight aggregated from multiple sources and the combination of malware signatures, real-time reputation scoring, application containment, and machine-learning and EDR capabilities.

Palo Alto Networks Traps 4.0

In contrast to traditional endpoint protection approaches -- which involve detecting and responding to security incidents after a breach has occurred -- Palo Alto Networks' Traps 4.0 is a multi-method prevention offering that pre-emptively blocks both known and unknown cyberthreats from compromising endpoints.

Back 1 ... 41   42   43   44   45   ... 62 Next

sponsored resources