IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
Reece Group Deploys BlackBerry Solutions To Protect Endpoints and Automate Threat Management
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.
Posted: 14 Jul 2020 | Published: 14 Jul 2020


How EDR Offers Threat Detection, Insights, and Remediation
sponsored by Malwarebytes
WHITE PAPER: Establishing an effective endpoint detection and response (EDR) platform can be an organization’s best defense against rampant malware and ransomware attacks. Read this white paper to learn more about EDR, including how it compares to traditional endpoints security and how it stands up to ransomware.
Posted: 16 Jul 2021 | Published: 16 Jul 2021


What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Networks

The Total Economic Impact™Of Deep Instinct
sponsored by Deep Instinct
ANALYST BRIEF: This Forrester Total Economic Impact report provides an exclusive insider look at the features, tangible benefits and 3-year financial impact of Deep Instinct – gathered through 4 customer interviews and data aggregation. Read on to access the full report.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

Deep Instinct

Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era
sponsored by BlackBerry
RESOURCE: In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.
Posted: 30 Jun 2020 | Published: 15 Jun 2020


The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020


Malwarebytes Video
sponsored by Malwarebytes
WEBCAST: To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. There are specific protocols that must be followed in the event of an attack, and with careful and diligent planning, you can significantly lower cyber risk. Watch this webinar to learn best practices for a secure workforce.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021


G2 2021 Winter Report
sponsored by Absolute Software Corporation
ANALYST REPORT: The Winter 2021 Grid Report for Endpoint Management in collaboration with Absolute Software helps you choose the right partner for endpoint management. Download the report to get started.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Absolute Software Corporation

3 Top Considerations in Choosing a Modern Endpoint Device
sponsored by Microsoft
RESOURCE: Selecting the correct endpoint devices for your organization isn’t always easy. Inside this article, uncover the 3 top considerations to use when weighing new endpoint device options.
Posted: 04 Aug 2020 | Published: 04 Aug 2020


12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences