End Point Security Reports

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 08 Feb 2021 | Published: 17 Jun 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to zero-trust security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 08 Feb 2021 | Published: 09 Mar 2020

TechTarget ComputerWeekly.com

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE: Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Cisco

Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
sponsored by VMware
WHITE PAPER: This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
Posted: 17 Oct 2014 | Published: 31 Jul 2014

VMware

Endpoint Threat Detection Gets More Response
sponsored by Solarwinds MSP
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016

Solarwinds MSP

Mobility Management Evolves Into BYOD and Beyond
sponsored by TechTarget Enterprise Desktop
EBOOK: Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

TechTarget Enterprise Desktop

Advanced Persistent Threat Detection: Can It Find Custom Malware?
sponsored by UnitedLex
EGUIDE: A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

Fighting Cybercrime in the 21st Century
sponsored by TechTarget Security
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

TechTarget Security

Desktop & Endpoint Management: Tools and Best Practices
sponsored by Dell Technologies
EGUIDE: Download this E-guide to learn how unified endpoint management (UEM) and other tools and best practices can ease desktop management for IT.
Posted: 05 Oct 2018 | Published: 04 Oct 2018

Dell Technologies