IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
11 Limitations of Network-Centric Security In The Cloud
sponsored by Lacework
RESOURCE: Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.
Posted: 24 Sep 2018 | Published: 24 Sep 2018

Lacework

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

The Zenefits Bug Bounty Story
sponsored by HackerOne
CASE STUDY: Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

HackerOne

Security with a Fluid Perimeter
sponsored by Somerville
ANALYST REPORT: While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.
Posted: 17 Jan 2020 | Published: 31 Jan 2019

Somerville

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform
sponsored by enSilo
WHITE PAPER: With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.
Posted: 13 Nov 2019 | Published: 31 Mar 2018


Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE: Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

ConvergeOne

Endpoint Security: from A to (N)Z
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how ANZ enterprises are approaching endpoint security and the tools you can add to your endpoint security arsenal.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info