All Research Sponsored By:Lumension
-
Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
-
Java Insecurity: How to Deal with the Constant Vulnerabilities
Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
-
2014 BYOD and Mobile Security Report
This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
-
WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
-
2014 Ultimate Buyers Guide to Endpoint Security Solutions
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
-
Application Whitelisting Best Practices: Lessons from the Field
This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
-
Endpoint Security: Anti-Virus Alone is Not Enough
Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
-
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
-
Weaponized malware now threatens the private sector
Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
-
Three Ways to Prevent USB Insecurity
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
-
Salvation Army Protects the Integrity of Data and Global Brand
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Salvation Army Protects the Integrity of Data and Global Brand
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
-
How to Achieve Device Control Peace of Mind
Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
-
Presentation Transcript: Content Monitoring in the Enterprise
This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
-
E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
-
Why Free Patch Management Tools Could Cost You More
This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
-
The CISOs Guide to Measuring IT Security
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
-
Lumension Endpoint Security: Device Control and Application Control
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
-
Lumension Endpoint Management and Security Suite
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
-
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
-
Demystifying IT Risk to Achieve Greater Security and Compliance
Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.
-
Lumension® Device Control for Microsoft® System Center
Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
-
The Best PCI Audit of Your Life
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.