You've requested...

Share this with your colleagues:

Evaluating Thin-Client Security in a Changing Threat Landscape

If a new window did not open, click here to view this asset.

Download this next:

Accelerating your path to security maturity

The Secureworks Security Maturity Model is a holistic, risk-based, business-driven approach to evaluating cybersecurity maturity based on an organization’s business operations and risk profile.

View this webcast to learn how the Secureworks Security Maturity Model can measure your security posture against similar businesses in your industry today and help you identify areas of improvement.

By downloading this content, you agree that Secureworks may (as a TechTarget Partner) contact you by email, phone or other means with information about our products and services. You can unsubscribe at any time. To learn more, please read our Privacy Statement.

 

These are also closely related to: "Evaluating Thin-Client Security in a Changing Threat Landscape"

  • Risk management strategies to help your company socially distance

    There are similarities between the strategies for managing organizational risk and managing your own personal risk when it comes to the coronavirus.

    While risk cannot be eliminated in either scenario, there are steps to take to minimize risk in both.

    View this article from Ostendio to learn more about managing risk at your organization.

  • Cyberattack simulation 101: Building a threat model

    Identifying and understanding the risks within your environment is critical aspect to an effective cybersecurity strategy – the best way to uncover these vulnerabilities is to build threat models and conduct attack simulations.

    Watch this webinar to learn more about:

    • Security program architectures
    • Building a threat model
    • Establishing attack simulations
    • What to do with your simulation data
    • & more

Find more content like what you just read:

  • How to tackle trust management

    Trust, or the placing of it, is one of the key activities at the core of our human endeavours. The process of placing trust is simpler when the process is physical and proximal - that is when you can see, feel and touch that which you are about to trust.

    Download

  • The ROI of governance, risk, and compliance

    ServiceNow GRC helps organizations modernize and advance their management of corporate governance, risk, and compliance. In this Forrester Total Economic Impact study, examine the potential ROI your enterprise may realize by deploying ServiceNow GRC.

    Download

  • Risk exposure: TikTok

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

    Download

  • How to create SMS policies that enable compliance

    The popularity of text messaging and social media has exploded in recent years, including in the workplace. In this white paper, examine how public safety agencies can create policies that allow for compliant use of text messaging and social media, and how to retain those communications for an efficient response to open records requests.

    Download

  • Test guide: Preparing for the Security+ SY0-501 exam

    In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Rethinking endpoint security for remote work

    Remote work is necessitating a radical rethink of operating models, particularly regarding employees’ productivity and access to critical systems and data. Explore this webpage to see how Microsoft’s solutions are helping organizations provide the secure remote working environment their employees need.

    Download

  • Buyer's guide: Thin clients

    Download this E-Guide to find out how our industry analysts recommend approaching a VDI deployment – even if you're just window shopping.

    Download

  • Buyer's guide: Thin clients

    Download this E-guide to find out how our industry analysts recommend approaching a VDI deployment - even if you're just window shopping.

    Download

  • VMware vs. Citrix vs. Microsoft

    Download this E-Guide to find out how our industry analysts recommend approaching a VDI deployment – even if you're just window shopping.

    Download

  • Buyer's guide: Thin clients

    Download this E-Guide to find out how our industry analysts recommend approaching a VDI deployment – even if you're just window shopping.

    Download

  • Thin client use cases: HR, manufacturing and more

    Access this paper to learn how HP Thin Clients can provide versatility across workplaces, workstyles, and workforces for your organization.

    Download

  • How to balance workforce demands with VDI and cloud

    This paper explains how HP Thin Clients can ensure your organizations IT management and security can evolve as the technology does.

    Download

  • 6 departmental use cases for thin clients

    Read this paper to learn how to unlock cloud users' full potential with powerful processing on reliable and secure HP Thin Clients that adapt to your needs.

    Download

  • November ezine: Peer-to-peer lending

    Credit always matters in the channel and peer-to-peer lending might just be the alternative some have been looking for

    Download

  • HP Thin Clients for Healthcare

    Read on to learn how HP Thin Clients are trusted by healthcare institutions around the world to help them support strict data privacy standards, deliver reliability, and streamline IT.

    Download

  • CW Buyer's Guide: Desktop virtualisation

    This eight-page buyer's guide looks at desktop virtualisation and identifies some of the options IT directors must consider when planning a virtualisation project.

    Download

  • Why Dedicated Software Development Testing Matters

    "If the development team followed spec and developed according to plan, how much testing is there to be done?"

    Download

  • The Ultimate Guide to as-a-Service for MSPs

    Jump into this 41-page eBook to learn how to start pivoting your offerings to an as-a-Service model – and how to market, sell to, onboard, and retain clients with an as-a-Service delivery model.

    Download

  • What can CIOs do about the skills shortage in ASEAN?

    In this e-guide, read more about the issues that IT leaders are grappling with, and what efforts are being made to plug the talent gap. Plus, learn how one company has successfully transformed its HR operations using cloud-based software.

    Download

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • Ultrabooks & Mobile Computing

    In this report extract, Juniper Research looks at the market challenges and opportunities of ultrabooks, the next generation of note book PCs.

    Download

  • NVMe-oF for high frequency trading: See it in action

    Read the following datasheet to discover the features and benefits of a NVMe-oF platform that delivers the ultra-low latency and high performance that high-transaction workloads require.

    Download

  • CW+: How to manage device lifecycles

    In a collaborative, de-perimeterised environment, if the device needs be trusted then the management of devices becomes critical when collaborating with another device, system or service.

    Download

  • Getting ready for the platform revolution

    In this week's Computer Weekly, as Ofcom moves to force a split between BT and its Openreach subsidiary, we examine whether the regulator's action will improve the roll out of full-fibre broadband. Our buyer's guide looks at trends in client access devices. And IT leaders discuss the roadmap to a software-defined infrastructure. Read the issue now.

    Download

  • Activity based working: The Hybrid Organisation: Buildings

    The way we work is now open to wide-ranging review. The concept of the office as the ‘dumb’ container for work, housing the corporation and its infrastructure assets, will be challenged by a number of factors explored in this paper. Work, in the future, will only be a verb. It is becoming a process, not a place.

    Download

  • E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances

    Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI.

    Download

  • IBM i 7.4 explored

    Dive into this IDC white paper to explore the unique nature of the IBM i platform in an IT world dominated by thin, kernel-based operating systems – and why IBM i-based enterprises are so keen on upgrading to i 7.4.

    Download

  • IBM i 7.4 explored

    Dive into this IDC white paper to explore the unique nature of the IBM i platform in an IT world dominated by thin, kernel-based operating systems – and why IBM i-based enterprises are so keen on upgrading to i 7.4.

    Download

  • Low cost handsets & entry level smartphones

    Though unprecedented changes have occurred in the last couple of years that have revolutionised the handset market, particularly at the top end of the market inhabited by smartphones, the low end market represents a continuing opportunity as emerging market individuals become connected in coming years.

    Download

  • Making the case for the cloud in common use airport technology

    This report from Amadeus looks at the business case for cloud computing in airports.

    Download

  • CIO predictions: The financial services world of the future

    This future business model of financial institutions will revolve around real-time data and new technologies—like automation and AI—that will help banks better serve their clients with personalization. Download this white paper to see what industry leaders think about the technology and trends shaping their organizations over the next decade.

    Download

  • IT as a driver of M&A success

    IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals.

    Download

  • Make your data and analytics available to anyone who can use it

    Your workforce needs to collect, analyze and visualize customer/client data at a near real-time response rate to remain competitive - this is the benefit of embedded analytics platforms. Read this white paper to learn about Qlik Solutions for embedded analytics.

    Download

  • Cloud: Scaling to succeed in new business models

    High-tech companies face challenges keeping pace with new cloud-based business models, this study from Accenture reveals.

    Download

  • Introducing StorSafe: Long-term, containerized archiving

    This paper highlights a long-term, persistent, containerized archival solution called StorSafe, which provides data preservation that is agnostic, heterogeneous, and highly portable. Read on to learn how your business could benefit from this system.

    Download

  • Enterprise IT in Europe: Defending against disruption

    In this e-guide, we focus on enterprise IT in Europe. The spotlight is shone on startups throughout Europe aiming to disrupt the sector by using the latest technologies and conversely on more traditional companies aiming to defend themselves against disruption through digital transformation.

    Download

  • CW Europe – June 2018

    Research from Computer Weekly has revealed that across Europe, there appears to be no consensus on where IT budgets will be spent over the next year. But what is clear is that total budgets are expected to rise. But where will the money go?

    Download

  • Clustering to counter Android malware

    This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.

    Download

  • Top RPA vendors, examined

    In an Everest Group market report analyzing RPA vendors and the RPA marketplace, UiPath emerged as a Leader and Star Performer. But what exactly sets UiPath from other vendors? Read this Everest Group focus report on UiPath to learn where UiPath’s strengths are, how their business is growing, and what you can expect from them.

    Download

  • Buld faster. Sell smarter. Go Global.

    Companies are increasingly embracing the merits of Artificial Intelligence (AI) to help them improve customer service, analyze real-time data and make better business decisions quickly and with confidence.

    Download

  • Forrester: Total Economic Impact of IBM Watson Assistant

    Companies are increasingly embracing the merits of Artificial Intelligence (AI) to help them improve customer service, analyze real-time data and make better business decisions quickly and with confidence.

    Download

  • 6 IT and business benefits of a consumption-based storage model

    Access this case study to learn the 6 IT and business benefits Kapsch BusinessCOM achieved after implementing HPE 3 PAR StoreServ Storage.

    Download

  • IBM ebook: You & IBM

    Today's Managed Services Providers (MSPs) and Cloud Solutions Providers (CSPs) are focused on building customer loyalty and accelerating time to market in order to maintain market competitiveness like never before. Working with a trusted partner so you're not going it alone, is one of the keys to success seen by fast-growing cloud- based companies.

    Download

  • Global sourcing trends 2011

    At the beginning of each year, we survey Morrison & Foerster’s Global Sourcing Group lawyers in Asia, Europe, and the United States regarding the current state of the world’s outsourcing market and emerging trends likely to shape that market over the next twelve months.

    Download

  • How systems of agreement are changing amid digital transformation

    Now more than ever, firms are examining their agreement processes to determine where and how they can be more efficient, more user-friendly and more secure. Download this Forrester report to explore the current state of systems agreement, as well as challenges and advances in the digital transformation of these processes.

    Download

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

    Download

  • MicroScope – June 2019: Sourcing IT among the clouds

    Outsourcing is changing as the anything-as-a-service model takes off.

    Download

  • Business risks of software vulnerabilities

    This article in our Royal Holloway Information Security Thesis Series looks at how four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses.

    Download

  • How to configure security and voice quality for remote workers

    Working from home is fast becoming a popular business model, since it offers exceptional flexibility and cost advantages for employer and employee alike. But how should the home work-space be configured to ensure optimal security and voice quality? Find out in this white paper.

    Download

  • Cato vs. Cisco vs. VMware: Which SD-WAN provider is best for you?

    SD-WAN is a popular way to improve connectivity in distributed organizations. A wide range of suppliers offer SD-WAN services in different business models and methods of consumption. In our expert guide, learn about the specific benefits and disadvantages of each purchasing model. To unlock access to this guide, participate in our research program.

    Download

  • Data lakes: Challenges, opportunities, and best practices

    Since the term “data lake” was first introduced in 2010, data lakes and various similar solutions have exploded in popularity. But businesses looking into data lakes may be asking themselves: What is a data lake? And how can we use one? Read this e-book to learn the essentials of data lakes and how to derive value from them.

    Download

  • Object storage vs. Amazon S3 for Starburst Presto

    This paper reveals the results of a test in which the Starburst Presto distribution ran on object storage, to determine the performance and effectiveness of the system. Access now to read the results and to see how object storage compares to Amazon S3 on similar workloads.

    Download

  • IT Handbook: Beyond PC’s: Navigating the New End User Client Landscape

    Access this expert guide to get an in-depth understanding of the various kinds of mobile devices that your environment needs to be able to support. Learn how trends such as consumerization and bring your own device (BYOD) can be utilized to boost productivity, mobility and efficiency.

    Download

  • eBook: IT Service Excellence Tool Kit

    Save a copy of this 122-page eBook to learn how to ensure your service desk is operating at its maximum potential – and how to configure it to deliver enhanced results to your clients.

    Download

  • The MSP Hub - wherever you want to go

    Unprecedented circumstances call for unprecedented work strategies, turning flexibility and adaptability from nice-to-haves to necessities. As a result, your clients will expect your products and services to include these capabilities.

    Download