IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
PODCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

Simplifying Fraud Analytics: 10 Steps to Detect and Prevent Insurance Fraud
sponsored by SAS
WHITE PAPER: This white paper outlines 10 steps that offer you the best chance of discovering and stopping fraud in your business. Learn fraud prevention tactics such as preparing your company for big data management, visualizing your data, creating a rules-based system to detect known types of fraud, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

SC Mag Reviews a SIEM Platform
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.
Posted: 16 Aug 2016 | Published: 01 May 2016

LogRhythm, Inc.

Gartner: Best Practices for Managing 'Insider' Security Threats
sponsored by Imperva
RESOURCE: Read Gartner's "Best Practices for Managing 'Insider' Security Threats" report and get threat prevention strategies to protect your enterprise from security breaches by internal users. Learn what drives these attacks such as the prevalence of bring your own device (BYOD) and cloud.
Posted: 19 Jul 2016 | Published: 17 Jun 2014

Imperva

Cisco 2016 midyear cybersecurity report
sponsored by Cisco
WHITE PAPER: The Cisco 2016 Midyear Cybersecurity Report provides insights for security professionals on the trends and developments affecting the security landscape for the last half of the year. Access now and go to page 45 in particular for a discussion on ransomware attacks on healthcare organizations.
Posted: 30 Sep 2016 | Published: 01 Jul 2016

Cisco

Minimizing the Identity Attack Vector with Continuous Authentication
sponsored by RSA Softcat
WHITE PAPER: Learn how continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

5 Reasons Endpoint Security Must Move to The Cloud
sponsored by CrowdStrike
WHITE PAPER: The mass migration to the cloud is proving a useful tool for expanding organizations who find themselves becoming increasingly exposed to cyberthreats. Discover why the cloud can be an ideal choice when looking to secure endpoints and what benefits it can provide your organization such as cost, flexibility, and agility.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

Waste less time fighting ransomware attacks
sponsored by Cisco
RESOURCE: Have you ever wanted to learn more about the infrastructure being used by a ransomware attack? Discover how to map out the internet infrastructure that attackers use to launch current and future attacks.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement