Endpoint Security IT Decision Center Handbook 2
sponsored by TechTarget Security
EGUIDE:
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013
|
|
|
Endpoint Security IT Decision Center Handbook 1
sponsored by TechTarget Security
EGUIDE:
Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
Posted: 22 Nov 2013 | Published: 22 Nov 2013
|
|
|
Information Security Magazine – April 2014
sponsored by TechTarget Security
EZINE:
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
|
|
|
ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014
|
|
|
International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER:
This resource contains the results of an international survey on enterprise mobility, consumerization, and mobile security, and also includes considerations for IT departments in light of this new information.
Posted: 21 Mar 2014 | Published: 31 Jul 2013
|
|
|
PC Data Migration Made Easy with Endpoint Backup
sponsored by Code42
WEBCAST:
PC data migration projects are challenging, but endpoint backup can make the process easier. This webcast will give expert advice on how to make the migration process as simple as possible.
Posted: 13 Mar 2014 | Premiered: Mar 24, 2014
|
|
|
CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST:
This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014
|
|
|
EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER:
Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011
|
|
|
Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by TechTarget Security
EZINE:
In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 05 Mar 2014 | Published: 05 Mar 2014
|
|
|
The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:
This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
|
|
|
Symantec Intelligence Report - January 2014
sponsored by Symantec Corporation
WHITE PAPER:
This in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
Posted: 03 Mar 2014 | Published: 31 Jan 2014
|
|
|
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Securing your Midsized Business
sponsored by IBM
WHITE PAPER:
This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013
|
|
|
Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER:
In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|
|
Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER:
In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014
|
|
|
2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST:
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014
|
|
|
Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER:
In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012
|
|
|
Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST:
This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014
|
|
|
BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013
|
|
|
Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER:
This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
Posted: 03 Feb 2014 | Published: 31 May 2013
|
|
|
Computer Weekly – December 17 Edition
sponsored by TechTarget ComputerWeekly.com
EZINE:
Can BlackBerry restore its business appeal? In this week's issue of Computer Weekly, we investigate whether former Sybase chief, John Chen, will be able to stem the decline of the smartphone maker and reinvent the company as a software business for the era of BYOD.
Posted: 16 Dec 2013 | Published: 17 Dec 2013
|
|
|
Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER:
Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011
|
|
|
Endpoint Security IT Decision Center Handbook 3
sponsored by TechTarget Security
EGUIDE:
Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013
|
|
|
Endpoint Security Best Practices
sponsored by Symantec Corporation
EGUIDE:
In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Posted: 26 Nov 2013 | Published: 26 Nov 2013
|
|
|
Emerging Security Trends and Risks: Insights for the Business Executive
sponsored by IBM
WHITE PAPER:
This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
Posted: 15 Nov 2013 | Published: 30 Jun 2012
|
|