All resources sponsored by:

Lumension

1 - 25 of 67 Matches
Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST:Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014
Get This Now


Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST:Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014
Get This Now


2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER:This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014
Get This Now


WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
sponsored by Lumension
VIDEO:In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014
Get This Now


2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST:This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014
Get This Now


Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST:This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014
Get This Now


Endpoint Security: Anti-Virus Alone is Not Enough
sponsored by Lumension
ANALYST REPORT:Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Posted: 16 Oct 2013 | Published: 31 Dec 2012
Get This Now


Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER:In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009
Get This Now


Weaponized malware now threatens the private sector
sponsored by Lumension
WHITE PAPER:Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
Posted: 15 Oct 2013 | Published: 12 Sep 2012
Get This Now


Three Ways to Prevent USB Insecurity
sponsored by Lumension
WHITE PAPER:This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
Get This Now


Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER:In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013
Get This Now


After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER:This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
Get This Now


Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY:Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007
Get This Now


How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY:Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013
Get This Now


Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT:This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013
Get This Now


SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR:Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012
Get This Now


The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control
sponsored by Lumension
WHITE PAPER:Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.
Posted: 12 Sep 2012 | Published: 12 Sep 2012
Get This Now


The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks
sponsored by Lumension
WHITE PAPER:Many businesses suffer attacks because they leave their endpoints unpatched and insecurely configured. Protecting every aspect of your organizations valuable information is an essential part of the security process. This white paper provides five tips for avoiding preventable attacks and creating a comprehensive vulnerability management plan.
Posted: 17 Jul 2012 | Published: 29 Feb 2012
Get This Now


Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER:Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Posted: 13 Jul 2012 | Published: 31 Mar 2011
Get This Now


E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER:Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012
Get This Now


Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER:This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012
Get This Now


The CISOs Guide to Measuring IT Security
sponsored by Lumension
WHITE PAPER:In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
Get This Now


Lumension Patch Management: Picking the Low-Hanging Fruit
sponsored by Lumension
WHITE PAPER:This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
Get This Now


Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER:This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security.
Posted: 01 Apr 2011 | Published: 01 Apr 2011
Get This Now


Three Ways to Prevent USB Insecurity in Your Enterprise
sponsored by Lumension
WHITE PAPER:USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.
Posted: 06 Jan 2011 | Published: 06 Jan 2011
Get This Now


1 - 25 of 67 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement