IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Complete Breakdown of the Endpoint Security Marketplace
sponsored by Webroot
WHITE PAPER: This exclusive white paper looks at the evolution of the endpoint security marketplace as it fights to limit threats that attack antivirus weaknesses, circumvent security protection, and compromise endpoint systems.
Posted: 29 Jan 2015 | Published: 16 Dec 2014

Webroot

Your Roadmap to More Effective Endpoint Protection
sponsored by Bit9, Inc.
EGUIDE: This expert guide gives up-to-date information on the best ways to protect your network's endpoints.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Bit9, Inc.

Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

Whitelisting: Develop Advanced Malware Protection
sponsored by Viewfinity
EGUIDE: This guide gives you a rundown on how whitelisting can help your security and what you can do to implement it.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Viewfinity

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

Why Endpoint Backup Is More Critical Than Ever
sponsored by Code42
WHITE PAPER: Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.
Posted: 12 Jun 2014 | Published: 30 Apr 2014

Code42

Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos, Inc.
ANALYST REPORT: This in-depth Gartner Magic Quadrant compares 18 vendors and their EPPs. Inside, learn about each platform's strengths and cautions, and see how each matches up on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Posted: 08 Aug 2014 | Published: 08 Jan 2014

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement