IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Embrace Mobility Without Sacrificing Security
sponsored by Citrix
RESOURCE: This infographic takes a closer look into how you can embrace a digital, mobile experience without sacrificing security. Discover 4 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

How to Bolster Endpoint Security Protection
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec & Blue Coat Systems

Stopping the Next Ransomware Outbreak
sponsored by Carbon Black
WHITE PAPER: The spike in ransomware outbreaks in the last two years has left security analysts and administrators searching for better protection. Discover 5 simple tips to prevent a ransomware outbreak at your enterprise.
Posted: 10 Aug 2017 | Published: 09 Aug 2017

Carbon Black

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Security Considerations for Next Generation Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: Endpoint compliance assessments are critical for today's mobile workforce environment. This white paper explains how and where next-generation endpoint compliance should be enforced, as well as additional considerations that are critical for ensuring a secure network.
Posted: 27 Jun 2017 | Published: 18 Mar 2016

Aruba Networks

Unified Management of Endpoints, End Users and Everything in Between
sponsored by IBM
RESOURCE: Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell and Microsoft
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell and Microsoft

Demo: Secure Browsing in the Cloud
sponsored by Authentic8, Inc.
VIDEO: Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.
Posted: 02 Aug 2017 | Premiered: 21 Dec 2016

Authentic8, Inc.

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE: Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 27 Jul 2017 | Published: 26 Jul 2017

Sentinel Labs, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement