IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Crafting a Secure Endpoint Management Strategy
sponsored by Vox Mobile Solutions
EGUIDE: Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions

Falcon Complete - Instant Cybersecurity Maturity White Paper
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

CrowdStrike

Endpoint Management & On-Going Mobile Support
sponsored by Vox Mobile Solutions
WHITE PAPER: In this white paper learn how a combination of managed mobility services and unified endpoint management can help your IT team achieve this balance for a secure digital workspace.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions

Bridging Cybersecurity Gaps with Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.
Posted: 26 Feb 2019 | Published: 02 Oct 2018

Trend Micro, Inc.

Lessons From 2018: Handling the Next Mobile Security Breach
sponsored by Samsung Electronics
NEWSLETTER: The past year hosted a new volume and variety of threats to enterprise devices and the Android OS platform. How can enterprises adapt to protect their mobile devices in 2019? Read on to find out.
Posted: 27 Mar 2019 | Published: 26 Dec 2018

Samsung Electronics

APAC guide to plugging endpoint security gaps
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

ComputerWeekly.com

IBM i Encryption: How to Protect Your Database
sponsored by HelpSystems
WHITE PAPER: Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems

2017 Global EDR Research & Market Leadership Award
sponsored by Tanium
WHITE PAPER: The challenge for endpoint security professionals is to keep pace with the changing tactics of hackers. Ultimately, an endpoint security vendor needs to be adaptable. In this white paper, learn about how Tanium achieved a leadership position in the Endpoint Detect and Response Stand Alone market, according to Frost & Sullivan.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

Tanium

Post-Perimeter Security
sponsored by Lookout
VIDEO: In order to stay secure in the post perimeter world, enterprises must first test the health of devices and then trust the user. Download this video to learn how Lookout's zero-trust access model can help secure your organization with continuous monitoring and alerts today
Posted: 16 Jan 2019 | Premiered: 31 Oct 2018

Lookout

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement