IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: IT administrators who classify corporate data and develop security and outsourcing policies will be a step ahead of those who only secure the endpoint in their organizations.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

SearchEnterpriseDesktop

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: In this exclusive series of security-based articles, IT experts examine and discuss the keys to creating a comprehensive security strategy that keeps all enterprise endpoints secure – as well as the pitfalls that can leave an organization vulnerable.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

SearchEnterpriseDesktop

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores and endpoint management solution that can mitigate your risk of an attack and limit the damage when one happens.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

A Closer Look at the New Enterprise Mobile Technology Stack
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this exclusive e-guide to take a look at the wide array of enterprise mobile technology available and find out how to choose the right products and services. Discover how these technologies can work together to push your organization toward mobility.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Dell, Inc. and Intel®

Enterprise Endpoint Backup: Automatic Backup Solution
sponsored by Code42
WHITE PAPER: Access this white paper to find out about the single, scalable, cross-platform solution for enterprise endpoint backup that Genentech implemented to give them peace of mind.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

What does Endpoint Security mean to you?
sponsored by ComputerWeekly.com
RESOURCE: Given the emerging demand for new layered security technologies, the once-dormant Endpoint Security market is now flush with venture capital investment, mergers and acquisitions, and rapid innovation. It would be great to get your opinion and as a thank you; you can download our exclusive report on 'What to look for in secure file transfer'.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com

Computer Weekly – 22 July 2014: Time to get serious about endpoint security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Computer Weekly: Going mobile in financial services
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

ComputerWeekly.com

Wherever It Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: BYOD offers a lot of benefits in terms of productivity and mobility, but it also presents a number of challenges when it comes to protection for endpoint data. This white paper highlights a cloud-powered data protection and management platform built to handle these challenges.
Posted: 11 Jun 2014 | Published: 30 May 2014

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement