IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Three Reasons to Choose Citrix Workspace Over Vmware Workspace One
sponsored by Citrix
WEBCAST: The need for secure endpoint management is becoming increasingly essential as endpoints grow in scope and complexity. But which UEM platform is best for your organization? Tune in to compare Citrix Workspace and VMware's Workspace ONE
Posted: 30 Aug 2018 | Premiered: Jul 18, 2018

Citrix

How HP Printers Detected London Airport's 2018 Cyberattack
sponsored by HP
CASE STUDY: On April 23, 2018, the cyberterrorist known only as "The Wolf" was able to spread malware across London airport's network using under-secured endpoints. Access this case study to learn how printer threat logs helped IT staff to isolate the attack quickly enough to avoid disrupting operations, negative publicity, and brand damage.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

HP

Three ways Citrix Workspace boosts productivity in the office — and beyond
sponsored by Citrix
WHITE PAPER: Download this white paper to see how an end-to-end secure, digital workspace can help your IT team overcome these challenges and securely deliver the apps, desktops, and data your teams rely on-from anywhere, on any device.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Citrix

Understanding Cyberattacks
sponsored by Panda Security
WHITE PAPER: It is critical to understand the cyber-kill chain for identifying threats throughout the different stages of an attack lifecycle. There are 7 basic steps to the cyber-kill chain. Download this white paper to discover details on all of them to halt cyberattacks in their tracks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Work Smart and Stay Safe with Chrome Enterprise
sponsored by Google
WEBCAST: Tune in, to learn about an OS and browser that offers proactive protections, granular policy controls, and continuous vulnerability management to help prevent breaches.
Posted: 16 Aug 2018 | Premiered: Jul 26, 2018

Google

Managing Microsoft Windows 10
sponsored by IBM
WHITE PAPER: Download this white paper for insights into how IBM MaaS360 can provide your organization with a combination of traditional client management and modern API management that enables unified management of all Windows devices.
Posted: 06 Nov 2018 | Published: 06 Nov 2018

IBM

Diamond Foods Shares the Recipe for Data Protection Success
sponsored by Carbonite
CASE STUDY: In this case study, learn why this nut supplier pairs server backup with endpoint data protection to give them the ability to recover over 40 TBs of data across more than 50 virtual and physical servers.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

Carbonite

Competitive System Resource Impact Testing
sponsored by Cylance
WHITE PAPER: Download this whitepaper for a look at the several tests conducted to determine the impact on a computer system and the user's ability to perform several common actions and their impact while detecting and quarantining malware. Read on to see the results.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cylance

Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution
sponsored by Bitdefender
VIDEO: With the increase in employee mobility and the use of off-premise endpoints, organizations need advanced threat detection and response tools to assist them. In this webinar, explore how an endpoint, detection and response (EDR) system can help combat threats and how to choose the right one for your organization.
Posted: 11 Oct 2018 | Premiered: 05 Oct 2018

Bitdefender
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement