IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed    Add to Google    Add to My Yahoo!
End Point Security Reports
 
17 Top Business Benefits of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about 17 business benefits of endpoint backup. Read on to discover how implementing endpoint backup systems can allow you to reap these benefits.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

Druva Software

Build Security Awareness with Incident Response Plans, Endpoint Management and Compliance
sponsored by Great Bay
EGUIDE: In this eGuide, security experts Paul Kirvan, Kevin Beaver and Mike Chapple explain everything you need to know about building an incident response plan.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Great Bay

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015


Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores an endpoint focused security strategy to allow protection to travel with the data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Understanding what your endpoint security policy needs
sponsored by GeoTrust, Inc.
EGUIDE: This expert guide examines the effectivenss of anti-virus software in the age of advanced threats.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.

What You Should Know About File Sync-And-Share Workloads
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look at how endpoint security and data backup should be handled with the rise of enterprise mobility and BYOD. Read on to learn more.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Commvault

Meet BYOD Challenges
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, discover one potential BYOD solution that delivers an access-agnostic approach which leverages a universal security and compliancy policy across all devices, while also reducing the IT burden with an easy-to-use self-registration process.
Posted: 14 Apr 2015 | Published: 28 Mar 2014

SHI International Corporation

Solidifying Cloud Security
sponsored by Ping Identity Corporation
VIDEO: This video will show you how Ping Identity's partner Fishnet Security enables clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency.
Posted: 03 Feb 2015 | Premiered: 21 Jan 2013

Ping Identity Corporation

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

Windows 8.1 Security: New and Improved
sponsored by ESET
WHITE PAPER: This white paper goes in-depth into the new security features of Windows 8.1.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement