ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Empowering Business Innovation: Ricoh USA, Inc. Partners for Success

    Sponsored by: Dell SecureWorks

    In this case study, discover how Ricoh, in collaboration with Secureworks, implemented, monitored and managed end-to-end security services in order to support their digital transformation initiatives and growing network complexity.

  • Building Robust Defenses with Limited Resources

    Sponsored by: Kaspersky Lab

    91% of organizations have experienced at least one attack in the course of a year. It has become clear that security, particularly endpoint security, cannot be ignored. In order to get a proper return on investment, your security must be both comprehensive and targeted. Get into this white paper to learn how to maximize your resources.

  • Ivanti Neurons Edge Intelligence - Demo

    Sponsored by: Ivanti ANZ

    Being on the edge is a goal for companies, but what does that mean? Edge intelligence services, like that provided by Ivanti Neurons’ platform, can help businesses stay informed about how, when, where, and why devices are being used within their ecosystem. Watch this short demo to learn more about achieving endpoint edge intelligence.

  • Why Traditional EDR Is Not Working—and What to Do About It

    Sponsored by: Duo

    The EDR market has exploded in recent years. But just because the product carries an EDR description, doesn’t mean those products have been proven particularly effective. In this SANS white paper, discover pitfalls in current EDR deployments, a checklist for evaluating EDR products, and much more.

  • EDR: The Case for Automation and Simplification

    Sponsored by: Kaspersky Lab

    Endpoint security is enhanced through increased visibility, but the ability to investigate threats and search for specific indicators of compromise can give endpoints an added layer of protection. Add in automated threat response, and your endpoint security is real-world ready. Read this white paper on endpoint detection and response to learn more.

  • Kaspersky Endpoint Detection and Response Optimum

    Sponsored by: Kaspersky Lab

    Kaspersky Endpoint Detection and Response (EDR) Optimum helps you stay safe in the face of complex and advanced threats by providing advanced detection, simplified investigation and automated response. Tap into this data sheet to learn more about its key features and benefits.

  • Your Guide to COVID-19-Related Threats

    Sponsored by: TechTarget

    Amid the existing uncertainty of the current pandemic, it's unfortunate – but not surprising – to see an increase in cyberattack campaigns using the coronavirus as an entry point. This expert guide, The Cybersecurity Professional's Guide to Pandemic-Related Threats, explores the various threats to watch out for and highlights

  • Enhancing the Modern Workplace with Hardware-Enforced Security

    Sponsored by: Servium

    An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.

  • 3 Top Considerations in Choosing a Modern Endpoint Device

    Sponsored by: Microsoft

    Selecting the correct endpoint devices for your organization isn’t always easy. Inside this article, uncover the 3 top considerations to use when weighing new endpoint device options.

  • With the Workplace Changing Quickly, It’s Time to Rethink Endpoint Security

    Sponsored by: Microsoft

    Remote work is necessitating a radical rethink of operating models, particularly regarding employees’ productivity and access to critical systems and data. Explore this webpage to see how Microsoft’s solutions are helping organizations provide the secure remote working environment their employees need.

  • Phishing Factories and Economies: The Real Persistent Threat

    Sponsored by: Akamai Technologies

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • SIG - Farm Credit Customer Story

    Sponsored by: Cisco Umbrella

    Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.

  • The Business Case for Embracing a Modern Endpoint Management Platform

    Sponsored by: Microsoft

    When it comes to modern endpoint management, it’s not a question of “if” but “how”. Check out this this expert resource to learn what to look for in a modern management platform.

  • Cyberthreat Hunting Guide

    Sponsored by: Bitdefender

    Threat hunting is the proactive search for cyber threats within a network, including those that have already slipped past endpoint security defenses. In today’s security zeitgeist, it is more commonplace to use AI and machine learning to hunt threats as it can keep networks ahead of the curve. Read this guide to learn more.

  • Research Shows IT Security Change Needed in Wake of COVID-19 Work-from-Home Move

    Sponsored by: Kaspersky Lab

    Employees are working remote, and there a large disparity between where secure access was before COVID-19 and where it needs to be now. Organizations cannot afford to leave their doors open when employees are behind their doors at home. Read this blog post for statistics on remote work and guidelines for protecting your network.

  • Types of Phishing Attacks You Need to Know to Stay Safe

    Sponsored by: Webroot

    Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.

  • Mobile Security for the Remote Worker

    Sponsored by: Lookout

    In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.

  • Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.

  • Lookout Discovery: Chinese Surveillanceware

    Sponsored by: Lookout

    The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.

  • CIO Insight: Why Mobile Threat Defense

    Sponsored by: Lookout

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

  • Stop Ransomware like REvil with Managed Detection and Response

    Sponsored by: CI Security

    Ransomware is the number one cause of loss of business. If you haven’t dealt with it, you are one of the lucky ones. One in five SMBs report they’ve fallen victim to a ransomware attack in the last two years. In this white paper, uncover several best practices to help you manage ransomware risks.

  • 5 Ways to Keep Remote Workers Secure and Productive

    Sponsored by: Absolute Software Corporation

    Organizations are working remote whether they like it or not. As a result, best practices must be in place, and steps must be taken to ensure that your network has both the bandwidth and the security to keep your employees productive. Explore this white paper for 5 ways to ensure remote continuity.

  • 2 Steps to Achieve Endpoint Compliance with KACE

    Sponsored by: Quest

    With so many moving pieces, achieving endpoint compliance is complicated. How does this affect you?

  • Combining endpoint protection and Mobile Device Management (MDM)

    Sponsored by: Quest

    Access this white paper to examine the reasons for incorporating mobile device management (MDM) into endpoint management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.