IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and IntelĀ®

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper gives you a detailed look at how to stop the chain of attack in a data breach.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Using Managed Endpoint Security to Grow Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper outlines how MSPs can prevent client chaos by implementing managed endpoint security into their services.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Solarwinds N-able

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014


Solving the App Gap to Ensure Enterprise Mobility Success
sponsored by StarMobile
WHITE PAPER: This white paper explains how to solve the "app gap" that exists between application virtualization and endpoint security in a largely BYOD world. Learn about three emerging technologies that aim to solve these mobile enterprise limitations.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Endpoint Data Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015


Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

The 2015 European Mobile Workforce Report
sponsored by Dimension Data
RESEARCH CONTENT: In this report, you will address the IT challenges that introducing a mobile workforce presents. Focusing in particular on European countries, this study highlights how organizations are driving effective end-user computing growth with MDM. Read on and get an insider's look at mobile IT management and enterprise mobile app trends for 2016.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Dimension Data

Macs in the Wild: Securing Your Mobile Workforce and Their Devices
sponsored by Centrify Corporation
WEBCAST: This webinar, presented by Jason Snell, Editor in Chief with Six Colors, and Peter Havens, Director of Product Management with Centrify, teaches you how to set up a strong defense against would be device, identity and data theft for your mobile workforce.
Posted: 03 Nov 2015 | Premiered: Sep 4, 2015

Centrify Corporation

Mobility Management Evolves Into BYOD and Beyond
sponsored by SearchEnterpriseDesktop
EBOOK: Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement