IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

ComputerWeekly.com

Unified Endpoint Management: IBM MaaS360 with Watson
sponsored by IBM
PRODUCT LITERATURE: Download this resource to discover a UEM platform that consolidates the management of all types of devices, regardless of form factor, platform or OS version.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM

Three signs it's time to move to a digital workspace
sponsored by Citrix
WHITE PAPER: Download this 6 page guide to see how a digital workspace with unified endpoint management can help solve the challenges and improve employee productivity and security.
Posted: 06 Jul 2018 | Published: 06 Jul 2018

Citrix

Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
RESOURCE: As security pros struggle with how to keep up with non-stop threats from every angle, a 10+ year old technology, data loss prevention (DLP) is hot again. Take a look at this 67-page guide for a better understanding about DLP technologies and how the 10+ year old technology has evolved.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

Digital Guardian

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017

Bitdefender

Closing Your App Gap with Business Dashboards and Analytics
sponsored by IBM
WHITE PAPER: Download this article to learn how a unified endpoint management platform utilizes AI/cognitive technology to provide specialized views on app usage, performance and security.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

IBM

How to drive productivity in today's cloud-first world
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a secure digital workspace can increase visibility and simplify management of all apps, desktops, data and devices while giving employees the unified experiences they need to be productive.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

Citrix

Ensure your Data is Protected Without Impacting User Productivity
sponsored by Druva Software
RESOURCE: Download this resource for an overview of an integrated data protection and governance system designed for today's mobile enterprise.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Druva Software

Evaluate Desktop Management Tools
sponsored by Dell and Intel
EGUIDE: Download this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.
Posted: 05 Oct 2018 | Published: 04 Oct 2018

Dell and Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement