IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Five Ways to Rethink Your Endpoint Protection Strategy
sponsored by McAfee, Inc.
WHITE PAPER: Device security is no longer about traditional antivirus versus next-generation endpoint protection. The truth is you need a layered and integrated defense that protects your entire digital terrain and all types of devices—traditional and nontraditional. In this white paper, discover 5 ways to rethink your endpoint protection strategy today.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

McAfee, Inc.

How to Survive Advanced Targeted Attacks
sponsored by enSilo
CASE STUDY: Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.
Posted: 21 May 2019 | Published: 21 May 2019


Getting a handle on endpoint management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

ComputerWeekly.com

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Cybersecurity tools send alerts to help identify malicious activity, but the burden remains with the organization to figure out whether that alert is meaningful and if and how it fits into a larger chain of malicious activity. In this white paper, explore 4 basic data sources that you can leverage for immediate visibility of security activities.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Splunk

Business Endpoint Protection
sponsored by Webroot
EBOOK: Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

Tanium: Unified Cloud Visibility & Control
sponsored by Tanium
PRODUCT OVERVIEW: In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Tanium

5 Considerations for Evaluating a Modern Enterprise Security Platform.
sponsored by Verizon
WHITE PAPER: Security teams will be stretched thin. The jobs they perform will become increasingly more complex given the continued proliferation of attacks. To meet these challenges, practitioners are considering new solutions and approaches. Download this white paper to explore 5 considerations for evaluating a modern enterprise security platform.
Posted: 03 Sep 2019 | Published: 28 Feb 2019

Verizon

Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up
sponsored by PortSys
RESOURCE: Companies US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

PortSys

Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement