Device Control Software White Papers
-
Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
Sponsored by: TechTarget ComputerWeekly.comThis article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
CW APAC: Expert advice on zero-trust security
Sponsored by: TechTarget ComputerWeekly.comZero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Laptop, desktop PC and mobile device strategy: Essential guide
Sponsored by: TechTarget ComputerWeekly.comIn this guide, you can find best practice, analysis of the latest trends, and expert advice on formulating enterprise strategy in laptops, desktop PCs and mobile devices.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
HP Device Manager 4.5 User Guide
Sponsored by: Hewlett Packard Enterprisethis comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
-
Essential Enterprise Mobile Security Controls
Sponsored by: TechTarget SecurityHow will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
-
Kaspersky Endpoint Security 8 for Windows
Sponsored by: KasperskyOrganizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
-
Computer Weekly - 17 April 2012: How to ensure smartphone security
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT.
-
Presentation Transcript: Revelations and Realities of Endpoint Security
Sponsored by: GFI SoftwareCompanies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.
-
E-Guide: Wireless LAN access control: Managing users and their devices
Sponsored by: TechTarget SecurityThis expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
Implementing Device Restrictions in Vista and Server 2008
Sponsored by: Global KnowledgeWith Vista clients and Server 2008 systems, we have a number of new Group Policy settings that allow us to exert some level of control over which devices users can install and use.
-
How BMC Is Scaling Agile Development
Sponsored by: Rally SoftwareThis whitepaper describes how BMC Software's Infrastructure Management Group transformed their development organization using agile development practices management applications from Rally Software Development.
-
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
Sponsored by: SecureWaveThis article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.