IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
Protecting data and simplifying IT management with Chrome OS
sponsored by Google Chrome OS
WHITE PAPER: Traditional endpoint security is a zero-sum game. The threats are constantly growing and so are the costs. Protecting endpoints is one of the greatest challenges faced by cybersecurity and IT operations professionals. It's time to rethink the model with Chrome OS.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Google Chrome OS

Malwarebytes Video
sponsored by Malwarebytes
WEBCAST: To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. There are specific protocols that must be followed in the event of an attack, and with careful and diligent planning, you can significantly lower cyber risk. Watch this webinar to learn best practices for a secure workforce.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021


XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Intrinsic Security: How to unify and accelerate endpoint security across the enterprise
sponsored by VMware
WHITE PAPER: By implementing unified security at the core control layers – endpoints, networks, identity systems, clouds and the workloads running on them – enterprise teams can reduce risk and costs while also meeting business goals. View this VMware + Carbon Black white paper to learn about intrinsic security.
Posted: 15 Mar 2021 | Published: 31 Jul 2020


Microsoft 365 Endpoint DLP: Is it Ready for the Enterprise?
sponsored by InteliSecure
WHITE PAPER: Organizations are in dire need of a reliable and simple way to protect their endpoints – in an effort to meet this growing need, Microsoft responded with their new Endpoint DLP tool, which was announced at a virtual event earlier this year. Read this guide learn more about the new Endpoint DLP tool.
Posted: 30 Sep 2020 | Published: 30 Sep 2020


Seven Must-have Endpoint Management Capabilities
sponsored by HCL Technologies Limited India
DATA SHEET: When endpoint management systems are effectively integrated with security and IT operations tools, they play a major role in proving compliance, stopping threats, consolidating tools, and protecting brands. Read the study to learn the Seven Must-have Endpoint Management Capabilities.
Posted: 08 Sep 2020 | Published: 30 Sep 2019

HCL Technologies Limited India

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


Into the Era of Secure Remote Work
sponsored by IT Corporation
EBOOK: The decentralization of the workplace makes endpoint security more critical than ever. And the new tactics used by hackers and cybercriminals require focus on different tools and solutions, not least when it comes to the cloud. What strategies can you employ to remain resilient? Dive into this e-book and grab security by the horns.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

IT Corporation

Challenge the Rules of Security: Transform the Threat Surface to Proactive Control
sponsored by Google Chrome OS
VIDEO: Watch now to learn how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
Posted: 24 Mar 2021 | Premiered: 12 Mar 2021

Google Chrome OS

Ten Signs It’s Time to Review Your Endpoint Protection Guide
sponsored by BlackBerry
RESOURCE: The ongoing trend of successful cyberattacks continues to illustrate that current cybersecurity practices and solutions may not be able to keep pace with sophisticated and evolving modern threats. Download this guide to learn the 10 signs that indicate it's time to review and reevaluate your endpoint protection.
Posted: 22 Apr 2021 | Published: 22 Apr 2021


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences