IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Your CEO Just Lost His Laptop - Now What?
sponsored by Druva Software
WEBCAST: Access this webcast to learn about an endpoint backup program that protects data from loss, threats, allows for secure file sharing, and complies with eDiscovery. Tune into to learn about the importance of implementing an effective endpoint backup strategy now.
Posted: 13 Feb 2015 | Premiered: Feb 13, 2015

Druva Software

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

A Revolutionary Platform Enabling End User Specific Solutions
sponsored by Compressus
WHITE PAPER: Access this collection of short white paper for an explanation of the challenges facing healthcare leaders and how a revolutionary platform can enable their ability to prepare for the future.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Compressus

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: Ensure endpoint IT compliance processes are properly implemented and enforced by following 7 key steps, presented inside. Examine three recent data breaches directly related to stolen or misplaced devices, the consequences of them, and how to avoid these within your organization.
Posted: 29 Apr 2015 | Published: 19 Jan 2015

Absolute Software

Creating a Powerful Anti-Malware Defense
sponsored by Malwarebytes Corporation
WHITE PAPER: In today's high-risk cybercrime environment, anti-malware and anti-exploit software need to be implemented on top of basic anti-virus. Read this white paper to learn more about successfully doing so.
Posted: 07 May 2015 | Published: 07 May 2015


Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software

How to Address Three Key Challenges When Considering Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about Gartner's recommendations for overcoming the 3 most common endpoint backup hurdles. Read on to learn how to keep company data safe, even on personal devices.
Posted: 01 Apr 2015 | Published: 07 Nov 2014

Druva Software

Device and Data Protection - Part 3
sponsored by Dell, Inc. and Intel®
WEBCAST: This webcast outlines how to protect workspaces with three easy steps to malware prevention. Learn about security tools that are designed to keep unauthorized users out of your data and business by combining leading software and hardware protection.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Dell, Inc. and Intel®

Critical Factors to Endpoint Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. & Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement