IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Case Study: Electronic Manufacturing
sponsored by enSilo
CASE STUDY: A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.
Posted: 20 Sep 2019 | Published: 20 Sep 2019


Where to Invest Next to Mature Cybersecurity
sponsored by CrowdStrike
WHITE PAPER: To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

CrowdStrike

Protect Critical Infrastructures from Nation-State Attacks
sponsored by enSilo
RESOURCE: Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.
Posted: 24 May 2019 | Published: 24 May 2019


Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

ComputerWeekly.com

Crafting a Secure Endpoint Management Strategy
sponsored by Vox Mobile Solutions
EGUIDE: Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions

The Digital Workspace: 3 Elements of Success
sponsored by Citrix
WHITE PAPER: When it comes to managing the digital workspace, IT leaders overwhelmingly selected security as the top challenge. However, when managed properly, the right cloud-based digital workspace can keep organizations secure. In this white paper, learn how a unified Citrix experience can help organizations expand their security.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Citrix

Enhancing IoT Visibility and Security
sponsored by Extreme Networks
WEBCAST: Many IoT devices were designed without imbedded security features, which is posing a security risk to many organizations. In this webcast, learn about the risks and attacks associated with IoT, how to approach IoT security, and how Extreme solutions can help.
Posted: 29 Oct 2019 | Premiered: Aug 13, 2019

Extreme Networks

Getting a handle on endpoint management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

ComputerWeekly.com

The Future of Cybercrime and Security
sponsored by Webroot
ANALYST REPORT: In Juniper Research's The Future of Cybercrime & Security report, explore key takeaways and an overview of the network & endpoint cybersecurity competitive landscape.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

How Barclays Improved IT Security with the Tanium Communications Architecture
sponsored by Tanium
CASE STUDY: Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey. Read on to learn more.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement