Endpoint Security Reports

7 best practices for Web3 security risk mitigation
sponsored by ComputerWeekly.com
EGUIDE: Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

ComputerWeekly.com

5 endpoint security best practices
sponsored by ComputerWeekly.com
EBOOK: With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.
Posted: 04 Aug 2022 | Published: 04 Aug 2022

ComputerWeekly.com

2022 Competitive Strategy Leader
sponsored by Xcitium
ANALYST REPORT: Endpoint security tools are in high demand due to the increasing complexity and occurrences of ransomware, malware, and other cyberthreats. Access this Frost & Sullivan report to learn about the key features of Comodo’s Xcitium and discover why it earned recognition for its endpoint security capabilities.
Posted: 22 Jul 2022 | Published: 22 Jul 2022

Xcitium

Infographic: Vulnerability management vs. Patch management
sponsored by ComputerWeekly.com
INFOGRAPHIC: Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.
Posted: 01 Jul 2022 | Published: 01 Jul 2022

ComputerWeekly.com

12 essential features of advanced endpoint security tools
sponsored by ComputerWeekly.com
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.
Posted: 22 Jun 2022 | Published: 22 Jun 2022

ComputerWeekly.com

Buyer's Guide to Managing Endpoint Privileges
sponsored by CyberArk Software, Inc
EBOOK: Cyberattackers have become more innovative when targeting privileged accounts and endpoints. Luckily, endpoint privilege managers (EPMs) offer a viable option for protection – but selecting the right tool can be tricky Read this EPM buyer’s guide to learn more about what evaluation criteria you should consider.
Posted: 03 Jun 2022 | Published: 04 Jun 2022

CyberArk Software, Inc

2 types of endpoint encryption to protect data
sponsored by ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

ComputerWeekly.com

CW APAC, April 2022: Trend Watch: Cyber security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access
Posted: 14 Apr 2022 | Published: 14 Apr 2022

ComputerWeekly.com

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 04 Jan 2022 | Published: 30 Nov 2020

Bitdefender

IGEL in Banking and Financial Services
sponsored by IGEL Technology GmbH
WHITE PAPER: Banks and financial services were some of the earliest adopters of remote desktop session hosts and virtual desktop infrastructure (VDI). In this report, learn what banks have learned from their long-time use of VDIs and the IGEL approach to keep endpoint user experiences high-quality and high-security.
Posted: 18 Nov 2021 | Published: 15 Jul 2020

IGEL Technology GmbH

Industrial Giant Discovers 200,000 Network Endpoints in One Day
sponsored by Beta Systems
CASE STUDY: One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.
Posted: 04 Nov 2021 | Published: 11 Feb 2020

Beta Systems

Network Security Management For IT and industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 04 Nov 2021 | Published: 10 Feb 2020

Beta Systems

Business Infrastructure Control System – BICS
sponsored by Beta Systems
DATA SHEET: Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
Posted: 04 Nov 2021 | Published: 10 Feb 2020

Beta Systems

How a Wine and Spirits Distributor Protects its Data and Reputation with Threat Hunting
sponsored by Cisco Secure
CASE STUDY: Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.
Posted: 22 Mar 2021 | Published: 11 Feb 2021

Cisco Secure

Marine Credit Union Bolsters Their Security with Cisco
sponsored by Cisco Secure
CASE STUDY: Marine Credit Union had a tough mission in front of them: Build top-notch security on a budget. They had to defend their highly targeted data against online criminals and nation states with the goal of safeguarding their members’ financial information. View this case study to discover how Cisco helped Marine Credit Union achieve their goal.
Posted: 22 Mar 2021 | Published: 16 Feb 2021

Cisco Secure

The Need for Speed: Second Generation EDR
sponsored by Fortinet, Inc.
WHITE PAPER: Even with the use of advanced machine learning and behavioral analytics, endpoint security solutions still can’t prevent 100% of threats. And while endpoint detection and response (EDR) has improved dramatically since its release, there are still gaps left to fill. Take a look at this ESG white paper to learn about second generation EDR.
Posted: 18 Mar 2021 | Published: 29 May 2020

Fortinet, Inc.

Case Study: Archdiocese
sponsored by Bitdefender
CASE STUDY: The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
Posted: 15 Mar 2021 | Published: 09 Feb 2021

Bitdefender

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 08 Feb 2021 | Published: 05 Jan 2021

Palo Alto Networks

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

ComputerWeekly.com

Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility
sponsored by Barracuda
WHITE PAPER: With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.
Posted: 08 Feb 2021 | Published: 30 Sep 2020

Barracuda

Enable and Secure Remote Work During the COVID-19 Pandemic
sponsored by Barracuda
PRODUCT OVERVIEW: The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.
Posted: 08 Feb 2021 | Published: 06 Apr 2020

Barracuda

CW ANZ, July 2020: Expert Advice on Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Quocirca: Selecting a cloud printing platform
sponsored by ComputerWeekly.com
RESOURCE: As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

ComputerWeekly.com

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet