IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
Account Registration Fraud Case Study
sponsored by Simility
CASE STUDY: Explore this case study to gain insight into how the world's largest marketplace for digital services was able to overcome the issues of account registration fraud by implementing a custom device risk model.
Posted: 05 Feb 2018 | Published: 05 Feb 2018


How Do You Know If Your Last Security Incident Is Fully Addressed?
sponsored by Tanium
RESOURCE: According to the Ponemon Institute's Cost of a Data Breach Study, it takes organizations an average of 191 days to detect a breach. Once you have dealt with a breach, how do you know it is fully addressed? This infographic reveals staggering statistics regarding cyberattacks, breach detection, and remediation.
Posted: 09 Jan 2018 | Published: 09 Jan 2018


Manage PC, Mobility, IoT with Unified Endpoint Management
sponsored by Citrix
VIDEO: Traditional client management tools can no longer support modern business needs. Windows 10 and the growing number of personal devices are forcing digital workspaces to embrace unified endpoint management. This webcast addresses how UEM helps solve challenges of traditional client management in the context of the new digital workspace.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018


Meet Compliance Requirements for Network and Data Security
sponsored by HP
WHITE PAPER: Although many IT departments rigorously apply security measures to computers and the network, printing and imaging devices are often overlooked. But printers can provide an entry to your network, and securing them is just as important. This white paper reveals recommendations for print and document security so you can meet compliance regulations.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018


Optimizing Endpoint Security for the Enterprise
sponsored by ConvergeOne
EGUIDE: Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.
Posted: 14 Mar 2018 | Published: 12 Mar 2018


GDPR will bring the Teeth that have been Missing in Data Security Auditing and Compliance
sponsored by SyncDog
WHITE PAPER: Data security standards have been around for decades yet standards enforcement has been lacking. This paper identifies 5 steps to help maintain compliance leading up to GDPR.
Posted: 28 Sep 2017 | Published: 28 Sep 2017


Endpoint Security: Total Economic Impact
sponsored by Absolute
RESEARCH CONTENT: How is your enterprise protecting its endpoints? Explore this Forrester report to learn about the benefits of an endpoint visibility and control strategy.
Posted: 13 Mar 2018 | Published: 13 Mar 2018


All Together Now: Securing the Internet of Things
sponsored by Juniper Networks
WHITE PAPER: IoT is at the center of many organizations' digital transformation strategies, but often without consideration of the fact that security for IoT is in its infancy. This Nemertes Research report offers insight into the security challenges within IoT and reveals 2 steps for improving security approaches.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Juniper Networks

User Risk Report: Results of an International Cybersecurity Awareness Survey
sponsored by Wombat Security Technologies
RESEARCH CONTENT: It is no secret that cybersecurity and its role in data protection is front-page news on a regular basis. This report reveals personal habits of employees regarding data and network security and overall shows a need for improvement in these areas.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

Wombat Security Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement