Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER:
Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011
|
|
|
Eight threats your antivirus won't stop
sponsored by Sophos
WHITE PAPER:
News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
Posted: 23 Dec 2011 | Published: 23 Dec 2011
|
|
|
Successfully Managing VDI Services with the BIG-IP System
sponsored by F5 Inc.
WHITE PAPER:
Learn how you can unite all the components required to make a complete and secure VDI services delivery solution in one integrated and consolidated platform.
Posted: 15 Nov 2011 | Published: 15 Nov 2011
|
|
|
Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by OpenText Security Solutions
WHITE PAPER:
Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011
|
|
|
Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER:
A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011
|
|
|
VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5
sponsored by VMware, Inc.
WHITE PAPER:
This document provides a high-level summary of a reference architecture for stateless virtual desktops with VMware View™. By leveraging the tiered storage capability in VMware View to support stateless virtual desktops, organizations can lower costs by about USD $500 per desktop.
Posted: 24 Aug 2011 | Published: 24 Aug 2011
|
|
|
Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER:
As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011
|
|
|
AppSense User Virtualization Platform
sponsored by AppSense
WHITE PAPER:
Among a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.
Posted: 27 Jul 2011 | Published: 26 Jul 2011
|
|
|
The Case For Endpoint Data Protection
sponsored by Cibecs
WHITE PAPER:
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C
Posted: 06 Jul 2011 | Published: 06 Jul 2011
|
|
|
Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER:
In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER:
When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011
|
|
|
A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER:
This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
Posted: 29 Jun 2011 | Published: 29 Jun 2011
|
|
|
Making Desktop Virtualization Part of Your Windows 7 Migration
sponsored by Dell Software
WHITE PAPER:
Most organizations are migrating to Windows 7 – it’s powerful and full of new functionality. However, this migration promises to be complex, time-consuming, expensive and create downtime for users. In this white paper, see how adopting desktop virtualization simplifies your Windows 7 migration – while reducing costs and increasing security.
Posted: 28 Jun 2011 | Published: 28 Jun 2011
|
|
|
2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER:
This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011
|
|
|
Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER:
As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011
|
|
|
Top 5 Threat Protection Best Practices
sponsored by Sophos
WHITE PAPER:
The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.
Posted: 11 Apr 2011 | Published: 11 Apr 2011
|
|
|
Why Customers Love VIPRE Business
sponsored by GFI Software
WHITE PAPER:
This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.
Posted: 14 Mar 2011 | Published: 11 Mar 2011
|
|
|
Protecting Against the New Wave of Malware
sponsored by GFI Software
WHITE PAPER:
Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.
Posted: 14 Mar 2011 | Published: 11 Mar 2011
|
|
|
How Can You Prepare for the Consumerization of IT
sponsored by DynTek & McAfee
WHITE PAPER:
The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.
Posted: 11 Mar 2011 | Published: 10 Mar 2011
|
|
|
Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
sponsored by VeriSign EMEA
WHITE PAPER:
This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
Posted: 18 Feb 2011 | Published: 18 Feb 2011
|
|
|
How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER:
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.
Posted: 17 Feb 2011 | Published: 17 Feb 2011
|
|
|
Take Back the Endpoint
sponsored by Kaspersky
WHITE PAPER:
During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
|
|
|
Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER:
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011
|
|
|
Trend Micro Endpoint Comparative Report Performed by AV-Test.org
sponsored by Trend Micro, Inc.
WHITE PAPER:
In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.
Posted: 31 Jan 2011 | Published: 31 Jan 2011
|
|
|
Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec
sponsored by Symantec Corporation
WHITE PAPER:
Symantec can help you meet the migration challenge—and capture the opportunity. Read this overview to learn more.
Posted: 19 Jan 2011 | Published: 19 Jan 2011
|
|