IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Securing and Enabling Your Remote Workforce
sponsored by Absolute Software Corporation
WHITE PAPER: Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Absolute Software Corporation

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: How will the lessons learned over the past year shape your endpoint and remote worker security goals for 2021? Let us know in this short survey and receive FREE access to our e-guide, The Ultimate Guide to Securing Today's Remote Workforce.
Posted: 28 Oct 2020 | Published: 01 Mar 2021

TechTarget

How a Wine and Spirits Distributor Protects its Data and Reputation with Threat Hunting
sponsored by Cisco Secure
CASE STUDY: Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.
Posted: 22 Mar 2021 | Published: 11 Feb 2021

Cisco Secure

SIG - Farm Credit Customer Story
sponsored by Cisco Umbrella
CASE STUDY: Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

CW ANZ, July 2020: Expert Advice on Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Malwarebytes Video
sponsored by Malwarebytes
WEBCAST: To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. There are specific protocols that must be followed in the event of an attack, and with careful and diligent planning, you can significantly lower cyber risk. Watch this webinar to learn best practices for a secure workforce.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021

Malwarebytes

MANAGED DETECTION AND RESPONSE (MDR) BUYER’S GUIDE
sponsored by Crowdstrike
WHITE PAPER: By 2024, Gartner predicts that 25% of organizations will be using MDR services. But what exactly is MDR, and why does Gartner predict the rise in popularity? Download this MDR buyer’s guide to learn more about MDR, including core elements and how to navigate the vetting process.
Posted: 13 Aug 2020 | Published: 13 Aug 2020

Crowdstrike

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Assessing the Economic Impact of Cybereason
sponsored by Cybereason
ANALYST REPORT: As the security threat landscape continues to grow in complexity, organizations are looking for the best solutions to protect their endpoints without overextending their already overworked security and IT teams. For help, read this Forrester report to get an in-depth look at key findings for the Cybereason Defense Platform.
Posted: 25 Aug 2020 | Published: 29 May 2020

Cybereason

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences