IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point SecurityReports
 
Computer Weekly – 22 July 2014: Time to get serious about endpoint security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

New Possibilities for Guarding Your Workforce Data
sponsored by Code42
VIDEO: ESG Senior Analyst Jason Buffington discusses IT's responsibility to protect endpoint data, whether BYOD or corporate-issued. He also highlights the benefits of Backup-as-a-Service solutions.
Posted: 13 Jun 2014 | Premiered: 29 May 2014

Code42

Presentation Transcript- Emerging Security Threats: Know Your Enemy in 2014
sponsored by BitGlass
TRANSCRIPT: In this webinar transcript, discover the process that cybercrime undergoes and how it directly affects the victim.
Posted: 11 Jul 2014 | Published: 24 Jun 2014


Understanding Microsoft Office 2013 Features, Licensing and Security
sponsored by SearchEnterpriseDesktop
EBOOK: Before moving to Microsoft Office 2013 or Office 365, IT pros should compare features, licensing schemes and application usage and be aware of emerging Office alternatives.
Posted: 19 May 2014 | Published: 22 May 2014

SearchEnterpriseDesktop

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Securing your Midsized Business
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension

Defense Against the Dark Arts: Finding and Stopping Advanced Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn critical information about today’s advanced threat landscape and what you need to do to stay secure.
Posted: 29 Oct 2013 | Published: 29 Oct 2013

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement