IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Time to Move from Reactive to Proactive Endpoint Security
sponsored by McAfee
RESOURCE: A useful new idea in software development is “shift left” – the earlier you can tackle an issue, the fewer defects you’ll have in delivery. But this philosophy can also be applied to endpoint security. Namely, acquiring knowledge of external threats can make for more accurate anticipation of them. View this article from McAfee to learn more.
Posted: 09 Dec 2020 | Published: 12 Jun 2020

McAfee

A Buyers’ Guide to SecOps
sponsored by VMware International Unlimited Company
EGUIDE: Endpoint detection and response (EDR) tools are emerging as a prominent figure in protecting an organization’s endpoints. Similarly, SecOps tools are quickly becoming critical in ensuring security across the DevOps lifecycle. Read this buyers’ guide for an overview of how to evaluate and select the right tool and vendor.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

VMware International Unlimited Company

5 Tips for Transforming Your Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Organizations that are digitally transforming and moving to the cloud are expanding their attack surface, and as a result, they need to ensure the effectiveness of their endpoint security. What steps can you take to keep your endpoints uncompromised? Browse this Cisco white paper to examine 5 tips for transforming endpoint security.
Posted: 07 Dec 2020 | Published: 30 Sep 2020

Cisco Systems, Inc.

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Know Your Security Model: Traditional vs. Contextual Protection
sponsored by Panda Security
WHITE PAPER: This e-book will cut through the fog that surrounds the term "next-gen endpoint security," exploring the differences between traditional and next-generation cybersecurity protection models, and how Panda's unique protection model employs the best of both to be an industry leading solution.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Panda Security

Endpoint Security Buyers Guide
sponsored by Sophos
EGUIDE: The endpoint security market has become overpopulated with a wide variety of solutions, too many of which offer indefensible market claims about how secure they are. Read this Endpoint Security Buyers Guide to help clear up the confusion and understand what it takes to make an informed choice.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Sophos

The Business Case for Embracing a Modern Endpoint Management Platform
sponsored by Microsoft
RESOURCE: When it comes to modern endpoint management, it’s not a question of “if” but “how”. Check out this this expert resource to learn what to look for in a modern management platform.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Microsoft

2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

Are Desktops Doomed?
sponsored by IGEL Technology GmbH
WHITE PAPER: Access this white paper to learn the results of an ESG survey that explored the effectiveness of alternate endpoint strategies like assembling a digital workspace and consuming desktops from a centralized data center or the cloud.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

IGEL Technology GmbH
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info