ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • The New Norm: Trend Micro Security Predictions for 2020

    Sponsored by: Trend Micro

    Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.

  • Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way

    Sponsored by: Malwarebytes

    In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.

  • Board Ready Endpoint Resilience in 5 Steps

    Sponsored by: Malwarebytes

    The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience is has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.

  • Why automation is essential for cyber resilience

    Sponsored by: Malwarebytes

    While digital transformation equips organizations to be more productive, it also exposes networks to potential threats. This data sheet outlines key insights into the current cybersecurity landscape and highlights why organizations should consider including automation into their strategy.

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Building supply company boosts endpoint security with Malwarebytes

    Sponsored by: Malwarebytes

    In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky

    Sponsored by: Tehama

    Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.

  • What is Tehama?

    Sponsored by: Tehama

    Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • Endpoint Protection

    Sponsored by: Malwarebytes

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

  • Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints

    Sponsored by: Cisco Umbrella

    An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.

  • Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi

    Sponsored by: Cisco Umbrella

    In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.

  • Securing the workplace of the future

    Sponsored by: Tehama

    A stolen or compromised identity is at the heart of many of the major data breaches you read about in the news. With virtual access becoming the norm, ensuring protection for a borderless workplace is critical to maintaining a secure environment. In this white paper, explore 3 key best practices for securing your digital workforce.

  • Security with a Fluid Perimeter

    Sponsored by: Somerville

    While it’s true the perimeter has changed, it has not vanished. Instead, the perimeter has become fluid—changing daily to adapt to the needs of users and modern business, as opposed to the old way of locking down the enterprise. In this white paper, learn how your organization can begin to benefit from this fluid perimeter.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • The Right Way to Combat Customer Journey Hijacking

    Sponsored by: Tala Security

    Most IT security teams focus on protecting user data, with little focus on user experience. By implementing a strategy that provides front-end and back-end protection, you can safeguard the interactions customers have with you, prevent the financial and reputational impacts of customer journey hijacking. Read on to get started.

  • Top 6 Reasons to More Carefully Consider Client-Side Security

    Sponsored by: Tala Security

    As online channels for retail grow in popularity, so too do the risks associated with attackers stealing personal and financial data. In this white paper, discover the top 6 reasons why you should more carefully consider enhancing client-side security.

  • The Weakest Link

    Sponsored by: Area 1 Security

    Phishing attacks are growing increasingly complex. Hackers are now targeting affiliates within an organization’s digital supply chain as an entry point into their target’s network. In this white paper, uncover tactics used in past supply chain phishing attacks and learn how to detect and mitigate these threats.

  • Lookout Phishing and Content Protection

    Sponsored by: Lookout Inc.

    While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.

  • Mobile Phishing Killchain

    Sponsored by: Lookout Inc.

    To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.

  • Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout Inc.

    Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.

  • PandaLabs Annual Report 2018

    Sponsored by: Panda Security

    As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.

  • Intelligent Security Starts at the Edge

    Sponsored by: Akamai Technologies

    In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.