IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Cisco Ransomware Defense: Keep Ransomware at Bay
sponsored by Cisco Umbrella
WHITE PAPER: Files and information are the lifeblood of an organization. Keeping this information secure is nonnegotiable. Without the appropriate defenses, ransomware can inflict enough damage to reduce an organization to operating with pen and paper. In this white paper, learn the benefits of Cisco Ransomware Defense.
Posted: 19 Feb 2019 | Published: 31 Oct 2017

Cisco Umbrella

Think You Need a BYO Strategy? Think Again.
sponsored by VMware
WHITE PAPER: Download this white paper for 5 steps to move away from BYO towards a unified digital workspace that helps manage users, devices, applications, and more, from one platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

VMware

Getting a handle on endpoint management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

ComputerWeekly.com

Henkel Extends Compliance to Mobile: Security Case Study
sponsored by Lookout
CASE STUDY: Learn how Henkel was able to achieve security for their devices and data using Lookout Mobile Threat Defense.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

Lookout

Printer Security: The New IT Imperative
sponsored by HP
WHITE PAPER: While it is understandable that printer security has taken a backseat to other endpoints in the past, IT organizations should start addressing the risks unsecured printers pose to their broader IT infrastructure and overall company risk governance. Read on to learn about printer security best practices other IT pros are taking, today.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

The 1st Step to Zero Trust: Asset Management for Cybersecurity
sponsored by Axonius
WHITE PAPER: 8 years after the Zero Trust model was introduced, the concept has hit the mainstream. A Forrester analyst says 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement it. In this white paper, learn the first step to implementing zero trust: asset management.
Posted: 21 Jan 2019 | Published: 21 Jan 2019

Axonius

Accelerate Your Digital Transformation with Unified Endpoint Management
sponsored by Kaseya
WHITE PAPER: To stay competitive and accelerate your path towards digital transformation, download this e-book to see how unified endpoint management (UEM) can help overcome DX challenges by combining endpoint and network management and reducing costs of licensing separate solutions.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Kaseya

Understanding the Mobile Threat Landscape
sponsored by Wandera
WHITE PAPER: 2019 should be another momentous year for mobile security, with cyberattacks growing rapidly in sophistication and distribution. In this report, uncover the key mobile security trends that emerged last year as well as a summary of predictions for the mobile threat landscape for the year ahead.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Wandera

Best Practices for a Modern Approach to PC Management
sponsored by VMware
WHITE PAPER: Download this white paper to learn about a unified endpoint management platform that provides a simplified, modern and secure approach to endpoint management, easing the burden on IT.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

VMware

IBM i Encryption: How to Protect Your Database
sponsored by HelpSystems
WHITE PAPER: Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized parties. But, how does encryption work on IBM i (AS/400, iSeries)? Read this guide for an overview of your options for implementing encryption on this unique platform.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

HelpSystems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement