IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
RAT Protection for Banking Customers That Works
sponsored by Buguroo
WHITE PAPER: Check out this white paper to learn about bugFraud from Bugaroo, a next-gen fraud prevention solution that identifies user’s behavioral and cognitive analytics to uniquely profile users in order to prevent online banking fraud through remote access trojan (RAT) attacks.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

Buguroo

Reece Group Protects Endpoints and Automates Threat Management
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

BlackBerry

The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

Microsoft 365 Endpoint DLP: Is it Ready for the Enterprise?
sponsored by InteliSecure
WHITE PAPER: Organizations are in dire need of a reliable and simple way to protect their endpoints – in an effort to meet this growing need, Microsoft responded with their new Endpoint DLP tool, which was announced at a virtual event earlier this year. Read this guide learn more about the new Endpoint DLP tool.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

InteliSecure

Paradise Lost: Exploiting the New Distributed Workforce Economy
sponsored by Tanium
WHITE PAPER: Organizations have noted the widened gaps in IT visibility since remote work became the norm - now it’s time to react. View this white paper to learn how unified endpoint security (UES)/unified endpoint management (UEM) can help detect and prevent these pandemic-related threats.
Posted: 24 Aug 2020 | Published: 02 Jun 2020

Tanium

Key Requirements of EDR: Business Needs Mandate Visibility Beyond the Endpoint
sponsored by Palo Alto Cortex
WHITE PAPER: Access this white paper to learn about the 4 central points of cybersecurity of the future and the key requirements of endpoint protection (EPP) and endpoint detection and response (EDR).
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Palo Alto Cortex

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation

Selecting the Right Ink Technology for ID Card Printing — What You Need to Know
sponsored by HID Global
WHITE PAPER: Selecting the right ink technology for ID badges and card printing can have a profound impact on the overall efficacy and durability of your card printing solution. This white paper explores the differences in today’s leading card printing technologies – highlighting the carious printing, dying and lamination methods. Read on to get started.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

HID Global

Achieving Resilience in Your Distributed Workforce Environment During the COVID-19 Pandemic and Beyond
sponsored by Tanium
WHITE PAPER: To accommodate the transformation to remote work, organizations have upended their traditional IT infrastructure and adopted decentralized networks, cloud-based services, and widespread usage of employees’ personal devices. This has revealed critical gaps in visibility. Use this white paper to learn how to fill these gaps and remain resilient.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Tanium

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info