IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

ComputerWeekly.com

Business Endpoint Protection
sponsored by Webroot
EBOOK: Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019


Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

Top 10 Mobile Deployment Tips for 2019
sponsored by Vox Mobile Solutions
WHITE PAPER: Read through 2019's top 10 mobile deployment tips to keep up to speed with the latest enterprise mobility trends – and get tips on how to streamline your budget, employee satisfaction, and management responsibilities along the way
Posted: 01 Jul 2019 | Published: 01 Jul 2019

Vox Mobile Solutions

6 Degrees of Network Security
sponsored by Cisco Umbrella
RESOURCE: A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Cisco Umbrella

Fidelis Endpoint : A Technical Deep Dive
sponsored by Fidelis
PRODUCT OVERVIEW: In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Evaluate Desktop Management Tools
sponsored by Dell Technologies
EGUIDE: Download this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.
Posted: 05 Oct 2018 | Published: 04 Oct 2018

Dell Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement