IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
3 Questions to ask Endpoint Security Vendors
sponsored by Great Bay
WHITE PAPER: Access this white paper now to discover how you can put your endpoint security vendor to the test by asking 3 key questions.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Dell Data Protection: Protected Workspace, Preventing Malware Attacks
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to learn how application virtualization can be used to create a protective barrier around applications that employees use that run untrusted content. Find out the steps involved in this process and how this can prevent attackers from ultimately gaining access to endpoints.
Posted: 28 Apr 2015 | Published: 28 Jun 2013

Dell, Inc. & Intel®

Simply Virtual Desktop Use and Management with and All-in-One Thin Client
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this whitepaper to learn about a new all-in-one (AiO) thin client that is powerful, yet stylish, and boasts one of the most secure, high performance thin client operating systems for simplified management.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Dell, Inc. and Intel®

3 Businesses Share Why They Chose Citrix XenDesktop Over VMware View
sponsored by Citrix
WHITE PAPER: This white paper explores three organizations who selected a desktop and application virtualization strategy that fit their needs from a single, easy to deploy platform. Find out the reasons behind their selection over other competitors and what factors they took into consideration.
Posted: 02 Jan 2015 | Published: 31 Dec 2013

Citrix

10 Common Pitfalls of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about the top 10 pitfalls commonly seen in endpoint backup and how to avoid them.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Druva Software

Tips for your move to VMware Horizon View
sponsored by VMware
WHITE PAPER: This informative resource highlights a technology that helps IT to tackle challenges from enterprise mobility by moving desktop assets into the data center, where IT staff can securely manage and deliver them to end users across any device. Find out 10 tips as you plan your move to virtual desktop infrastructure (VDI).
Posted: 17 Mar 2015 | Published: 31 Dec 2013

VMware

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

Mobile Security Considerations for Healthcare
sponsored by Insight
WHITE PAPER: In this resource, discover the five essential attributes to look for when choosing mobile security software for your healthcare organization.
Posted: 04 May 2015 | Published: 28 Feb 2015

Insight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement