IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

How to Deliver Remote Access to Windows Apps
sponsored by Citrix
WHITE PAPER: This guide outlines a comprehensive technology that delivers Windows-based applications to remote users on any type of endpoints as well as to physical workspaces. Explore the five-layer solution architecture and discover how each of these layers work together to provide a secure environment for delivering applications.
Posted: 17 Apr 2015 | Published: 31 Jul 2014

Citrix

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: This white paper shows you the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015

BitSight

IT Pros Share Their Experiences Combating Printer Security Threats
sponsored by HP Limited
WHITE PAPER: This white paper outlines the potential security threats posed by printer networks and what you can do to stop them. Learn how companies in three different industries were able to secure their printers, as well as printer security tips that can help you protect your network.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

HP Limited

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Kingpin Communications
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Kingpin Communications

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This white paper gives you insight on how to protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Endpoint Security: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement