IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017


Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

IoT: Take Control of the Edge
sponsored by VMware Pulse
VIDEO: With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.
Posted: 14 Feb 2018 | Premiered: 05 Feb 2018

VMware Pulse

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017


Security within the Financial Services Industry
sponsored by enSilo
RESOURCE: There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Servers, Servers, Everywhere: How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: With the vast shift to the cloud, securing workloads in multiple locations has become more complex than ever before. Access this white paper to gain valuable insights into the security challenges of the hybrid cloud and how you can overcome these challenges.
Posted: 29 Nov 2017 | Published: 31 Mar 2017


Endpoint Security - Market Quadrant 2016
sponsored by Symantec
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016


Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Holistic Endpoint Security
sponsored by Cylance
RESOURCE: According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.
Posted: 13 Feb 2018 | Published: 13 Feb 2018


Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement