IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
Cloud Security: The Optimal Response to Multi-Site Challenges
sponsored by Kaspersky Lab
CASE STUDY: In this case study, follow AMISEP, a community development association, as they partner with Kaspersky to implement Endpoint Security Cloud in order to unify, monitor and protect their growing number of distributed endpoints.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

Building the Business Case for Improving Endpoint Security
sponsored by VMware International Unlimited Company
WHITE PAPER: According to VMware Carbon Black’s latest Global Threat Report, cyberattackers are targeting endpoints at an increasing rate. So now you must get your boss, and other executives in agreement – but how? This white paper outlines how to build a business case for endpoint security investment. Read on to get started.
Posted: 06 May 2020 | Published: 06 May 2020

VMware International Unlimited Company

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures
sponsored by Thales
WHITE PAPER: Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.
Posted: 30 Jun 2020 | Published: 30 Apr 2020

Thales

Guide to AV Replacement
sponsored by Crowdstrike
WHITE PAPER: As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.
Posted: 08 Jun 2020 | Published: 08 Jun 2020


NIST Cybersecurity Framework Implementation Overview
sponsored by Absolute Software Corporation
WHITE PAPER: In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.
Posted: 17 Feb 2020 | Published: 29 Oct 2018

Absolute Software Corporation

Cybersecurity and Education: The State of the Digital District in 2020
sponsored by Absolute Software Corporation
WHITE PAPER: Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Absolute Software Corporation

The Future of Network Security Is in the Cloud
sponsored by Apcela
ANALYST REPORT: Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.
Posted: 11 Nov 2019 | Published: 30 Aug 2019

Apcela

Looking for a WSUS Alternative
sponsored by Automox
RESOURCE: When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.
Posted: 15 Apr 2020 | Published: 02 Apr 2020


Steps to secure endpoints against threats.
sponsored by Cisco Umbrella
EBOOK: With this critical infrastructure, applications, and sensitive data now stored in the cloud, attackers have even more incentive to target endpoints as their easiest point of entry. Access this e-book to learn about an effective security solution that is simple, open, and automated.
Posted: 20 May 2020 | Published: 20 May 2020

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info