IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell and Microsoft

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

Advanced IAM for Endpoint and Mobile
sponsored by IBM
WHITE PAPER: Inside this white paper, learn how IAM can help simplify access to your cloud and mobile apps while increasing security.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

Improving Endpoint Security and Signature-Based Detection
sponsored by Sentinel Labs, Inc.
EGUIDE: Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Sentinel Labs, Inc.

Cloud-based Apps: For Better or Worse
sponsored by Verizon
WHITE PAPER: In this white paper, gain a stronger understanding of the questions you should be asking when implementing SaaS, as more business apps move to the cloud.
Posted: 31 Oct 2017 | Published: 28 Feb 2017

Verizon

Top 5 IoT Deployment Best Practices
sponsored by Hewlett Packard Enterprise
RESOURCE CENTER: Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

Hewlett Packard Enterprise

6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE: Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 27 Jul 2017 | Published: 26 Jul 2017

Sentinel Labs, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement