ComputerWeekly.com Research Library

Powered by Bitpipe.com

Device Control Software Research

  • DevSecOps Blueprint

    Sponsored by: WhiteHat Security

    The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization.

  • Laptop, desktop PC and mobile device strategy: Essential guide

    Sponsored by: ComputerWeekly.com

    In this guide, you can find best practice, analysis of the latest trends, and expert advice on formulating enterprise strategy in laptops, desktop PCs and mobile devices.

  • Getting to grips with BYOD

    Sponsored by: ComputerWeekly.com

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

  • Essential Enterprise Mobile Security Controls

    Sponsored by: SearchSecurity.com

    How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

  • E-Guide: Wireless LAN access control: Managing users and their devices

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.

  • Salvation Army Protects the Integrity of Data and Global Brand

    Sponsored by: Lumension

    In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.

  • After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®

    Sponsored by: Lumension

    This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.

  • HP Device Manager 4.5 User Guide

    Sponsored by: Hewlett Packard Enterprise

    this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software

  • Kaspersky Endpoint Security 8 for Windows

    Sponsored by: Kaspersky Lab

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • Computer Weekly - 17 April 2012: How to ensure smartphone security

    Sponsored by: ComputerWeekly.com

    This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT.

  • Presentation Transcript: Revelations and Realities of Endpoint Security

    Sponsored by: GFI Software

    Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.

  • Transform with Mobile Apps

    Sponsored by: AT&T Corp

    It’s time to start thinking strategically about enterprise mobile applications. Outside of a few vertical industries, IT isn’t able to enforce a single device platform or OS. Applications are being requested for a wider range of devices, and more end-user applications are coming from outside IT.

  • Free Software – Solve Common LAN problems with Switch Port Monitor Utility

    Sponsored by: Fluke Networks

    For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more.

  • Trusted Computing: Establishing Device Authentication

    Sponsored by: Wave Systems Corp.

    View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.

  • Adopting iPad for Enterprise Use. Register Now!

    Sponsored by: Sybase, an SAP company

    There is little doubt that Apple's iPad and iPhone will become valuable enterprise productivity tools. Watch this Sybase webcast and learn why IT departments should consider iPad and iPhone when planning new enterprise mobility strategies.

  • New Insider Threat Emerges in the New Economy

    Sponsored by: Lumension

    Learn how employees and partners are engaging with IT assets and intellectual property.

  • Implementing Device Restrictions in Vista and Server 2008

    Sponsored by: Global Knowledge

    With Vista clients and Server 2008 systems, we have a number of new Group Policy settings that allow us to exert some level of control over which devices users can install and use.

  • How BMC Is Scaling Agile Development

    Sponsored by: Rally Software

    This whitepaper describes how BMC Software's Infrastructure Management Group transformed their development organization using agile development practices management applications from Rally Software Development.

  • Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk

    Sponsored by: SecureWave

    This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.