Endpoint Security White Papers

(View All Report Types)
Endpoint Privilege Needs Management and Security – Here’s How to Attain Both
sponsored by CyberArk
WHITE PAPER: To help you identify the controls needed to protect endpoints, this whitepaper explores key differences between endpoint privilege management and endpoint privilege security solutions.
Posted: 07 Mar 2024 | Published: 07 Mar 2024

CyberArk

Building a Business Case for CyberArk Endpoint Privilege Manager™
sponsored by CyberArk
WHITE PAPER: In today’s digital world, cybersecurity threats continue to increase. Building a business case for adopting an endpoint privilege manager must be prioritized to help protect your critical assets. This whitepaper will help you understand the risks of not securing your endpoints and use cases for CyberArk Endpoint Privilege Manager.
Posted: 07 Mar 2024 | Published: 07 Mar 2024

CyberArk

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 08 Feb 2021 | Published: 05 Jan 2021

Palo Alto Networks

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
sponsored by VMware
WHITE PAPER: This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
Posted: 17 Oct 2014 | Published: 31 Jul 2014

VMware

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos
WHITE PAPER: This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014

Sophos

Why Endpoint Backup Is More Critical Than Ever
sponsored by Code42
WHITE PAPER: Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.
Posted: 12 Jun 2014 | Published: 30 Apr 2014

Code42

Strengthen Enterprise Resilience with Automated Endpoint Backup
sponsored by Code42
WHITE PAPER: Access this white paper to delve into new research that highlights potential problems and gaps in organizations' approaches to endpoint backup. Inside, find out why smart IT leaders are looking for automated endpoint backup solutions.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Code42

Wherever It Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: BYOD offers a lot of benefits in terms of productivity and mobility, but it also presents a number of challenges when it comes to protection for endpoint data. This white paper highlights a cloud-powered data protection and management platform built to handle these challenges.
Posted: 11 Jun 2014 | Published: 30 May 2014

Code42

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Case Study - Anittel Simplifies Managed AV Service
sponsored by OpenText Security Solutions
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

OpenText Security Solutions

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Drive More Value from Endpoint Security with Cloud-Based Anti-Virus Protection
sponsored by OpenText Security Solutions
WHITE PAPER: This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014

OpenText Security Solutions

Cloud Deployment Strategies: Ensure Enterprise Endpoint Backup
sponsored by Code42
WHITE PAPER: This white paper highlights a system that lets organizations select their preferred cloud deployment strategy, ensuring they meet or exceed industry standards for data security. Read on to get the flexibility you desire, and the security you need.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by OpenText Security Solutions
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

OpenText Security Solutions

Taking Managed Security Services To The Next Level
sponsored by OpenText Security Solutions
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

OpenText Security Solutions

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014

Hewlett Packard Enterprise