IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Food for the Hungry Stops Malware in its Tracks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn how a major non-profit eradicated malware in its network.
Posted: 08 May 2015 | Published: 08 May 2015


Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

Endpoint Protection for Today's Threats
sponsored by Webroot
WHITE PAPER: This white paper introduces a new endpoint security technology that takes up less space on your devices while blocking more advanced threats.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Webroot

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This white paper describes what users look for in an EFSS solution, including the top five corporate EFSS security requirements. Read on to learn about a solution that enables organizations to keep employees productive while meeting IT security and compliance requirements.
Posted: 11 Aug 2015 | Published: 29 May 2015

Acronis

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation

Sysinternals Still Essential for Desktop Troubleshooting
sponsored by SearchEnterpriseDesktop
EBOOK: The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchEnterpriseDesktop

What does Endpoint Security mean to you?
sponsored by ComputerWeekly.com
RESOURCE: Given the emerging demand for new layered security technologies, the once-dormant Endpoint Security market is now flush with venture capital investment, mergers and acquisitions, and rapid innovation. It would be great to get your opinion and as a thank you; you can download our exclusive report on 'What to look for in secure file transfer'.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement