IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point SecurityWhite Papers (View All Report Types)
 
Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Hot Knives Through Butter: Evading File-based Sandboxes
sponsored by FireEye
WHITE PAPER: This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

FireEye

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

Hewlett-Packard Company

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 21 Mar 2014 | Published: 30 Nov 2013

Dell, Inc.

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Revolutionary architecture, evolutionary deployment
sponsored by Cisco
WHITE PAPER: Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more.
Posted: 08 Apr 2013 | Published: 28 Feb 2013

Cisco

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement