IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point SecurityWhite Papers (View All Report Types)
 
Tips for Driving User Adoption in New Technology Deployment
sponsored by Code42
WHITE PAPER: How can you successfully deploy a new technology and ensure users are on board? In this on-demand webinar, Paul Glen, author of "The Geek Leader's Handbook," delves into the interpersonal issues IT faces when implementing a new technology and shares how user adoption is the key to a successful deployment.
Posted: 07 Jul 2014 | Published: 03 Jul 2014

Code42

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 08 Jul 2014 | Published: 18 Apr 2014

Sophos, Inc.

DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Verisign, Inc.

Crucial Enterprise Endpoint Backup Requirements
sponsored by Code42
WHITE PAPER: This crucial paper provides a helpful checklist of the requirements an enterprise endpoint backup strategy needs to satisfy in order to properly and successfully protect the data stored on your endpoints.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Code42

Defense Against the Dark Arts: Finding and Stopping Advanced Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn critical information about today’s advanced threat landscape and what you need to do to stay secure.
Posted: 29 Oct 2013 | Published: 29 Oct 2013

Proofpoint, Inc.

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by McAfee, Inc.
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement