Blog

Insights and Updates from the Zip Security Blog

Have questions on MDM, EDR, or other enterprise security topics? We've got you covered!
Categories
Search
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security

In Defense of Local Admin Rights

Learn the risks and benefits of local admin rights. Discover how to balance user productivity with least privilege security using modern endpoint guardrails.
Josh Zweig
February 16, 2024
5 min read
Security

Building a Culture of Security Consciousness: Getting a Security Program off the Ground as a ‘Department of One’

A webinar recap discussing prioritization, tooling, and approaches to building a security 'Department of One'
Cindy Huang
February 8, 2024
5 min read
Security

Endpoint Security Management: From Antivirus to Posture Management

Master endpoint security management with Zip Security and prevent configuration drift, enforce device trust, and harden your security baseline.
Ankit Gupta
February 2, 2024
5 min read
Windows

How to Manage Windows MDM and Asset Inventory Without Entra ID Accounts

Managing Windows MDM without Entra ID doesn't have to be a manual mess. Learn how to bridge the gap between your IdP and Intune for seamless, automated control.
Chris Bond
January 25, 2024
5 min read
MDM

Unified Endpoint Management for Device Security

Discover how unified endpoint management enforces device security, prevents silent failures, and strengthens device trust across your organization.
Josh Zweig
January 16, 2024
5 min read
Identity Solution

Navigating the Cybersecurity Landscape: A Deep Dive into Identity Solutions

This deep dive demystifies the complexities of Identity Solutions, offering insights into their mechanisms, selection criteria, and the impact they have on safeguarding against the theft of credentials.
Cindy Huang
January 9, 2024
5 min read
How To Guide

What Cybersecurity Tools do you Need to Build an Effective Security Strategy?

In this post, we’ll cover the fundamental building blocks of an effective cybersecurity strategy and provide practical information on how best to assess different tools to determine which meet your organization’s requirements.
Cindy Huang
January 4, 2024
5 min read
Security

Security for Hard Tech Companies

Securing your hard tech company can be a daunting task. To help you stay secure, we’ve compiled a list of the highest return on investment (ROI) actions you can take to protect your company data.
Gabbi Merz
November 20, 2023
5 min read
Company

Announcing Our $7.7M Funding Round to Protect Businesses from Cyber Threats

We are excited to announce our $7.7M funding round co-led by General Catalyst and Human Capital, with participation from BoxGroup!
Josh Zweig
November 14, 2023
5 min read