IT Management  >   Systems Operations  >   Security  >  

End Point Security

RSS Feed   
End Point Security Reports
 
The Total Economic Impactâ„¢ Of VMware Workspace ONE For Windows 10
sponsored by VMware
ANALYST REPORT: In this white paper discover how Workspace ONE can ease endpoint management across devices running Windows 10.
Posted: 29 Oct 2018 | Published: 30 Sep 2018

TOPICS: 
VMware

How a Children's Hospital Found the Medicine for Endpoint Security
sponsored by Cylance
CASE STUDY: This case study explores how Phoenix Children's Hospital and its IT security team prevents malicious activity targeting their 5,000 endpoints before it can endanger sensitive patient and payment information and hospital operations.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

TOPICS: 
Cylance

Securing the Cloud Adoption Journey
sponsored by British Telecommunications PLC
RESOURCE: The adoption of hybrid and cloud networks brings about new security risks. If security is to be maintained within these environments, a list of obstacles must be overcome. Download this resource to discover the 5 core obstacles that often prevent businesses from securing their cloud environments.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

TOPICS: 
British Telecommunications PLC

Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO: Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018

TOPICS: 
Cylance

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

TOPICS: 
Fidelis

Five steps to executing a mobile threat defense strategy
sponsored by MobileIron
WHITE PAPER: Download this five-step guide to help you design a best-practice strategy that delivers actionable intelligence and immediate protection against advanced mobile threats that target your mobile workforce.
Posted: 14 May 2018 | Published: 14 May 2018

TOPICS: 
MobileIron

PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 29 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Panda Security

Detection and Response: Discover and respond to targeted attacks with advanced detection techniques
sponsored by Trend Micro, Inc.
RESOURCE: Advanced threats are designed to bypass cybersecurity defences and compromise sensitive data. Effective detection and response solutions seek out these threats and eliminate them. In this resource, learn how Trend Micro has layered detection and response techniques into its Endpoint Protection Platform to leverage its response capabilities.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Trend Micro, Inc.

Top 4 Things to Consider when Choosing a Next-gen Endpoint Security Solution
sponsored by Cylance
RESOURCE: If you are making the move to a next-gen endpoint security solution to improve your team's efficiency, meet government mandates or other reasons, this resource highlights 4 characteristics to consider before making a selection.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

TOPICS: 
Cylance

Why the Citrix-Microsoft Relationship Will Enhance Digital Workspace Solutions for Customers
sponsored by Citrix
RESOURCE: Download this resource to learn how a Citrix-Microsoft partnership can provide the capabilities your IT team needs to deploy digital workspaces more quickly, effectively and securely.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

TOPICS: 
Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement