ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Menlo Security

    Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.

  • Isolation: Separating Malware from the Network, Not Devices

    Sponsored by: Menlo Security

    As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.

  • Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout

    Sponsored by: Lookout

    With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints

  • Post-Perimeter Security 101: Dawn of a Borderless World

    Sponsored by: Lookout

    With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.

  • Quantifying the Point Solution Nightmare

    Sponsored by: Tanium

    Forrester, in partnership with Tanium, conducted research into the current state of security and operations tools, teams, and trends to quantify the complexity of endpoint security management and integration. Read on to uncover the results and conclusions.

  • Schneider Electric Secures 50,000 Devices with Lookout

    Sponsored by: Lookout

    As organizations shift towards remote access capabilities, securing mobile devices should be a top priority. In this case study, discover how Schneider Electric, a leader in energy management and automation, was able to build a complete mobile security strategy.

  • Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.

  • Tanium: Unified Cloud Visibility & Control

    Sponsored by: Tanium

    In this brief, find 7 best practices shared by organizations that have been successful in securely migrating to the cloud. Also, learn how Tanium can help you accelerate cloud migration strategies with low risk.

  • Tanium for IT Operations Management

    Sponsored by: Tanium

    According to Forrester, 74% of organizations state that the number of endpoint tools they have limits their effectiveness. Patchwork point services are disparate and incomplete in their visibility. In this solution brief, dive deeper into the pains of legacy point services and explore Tanium’s Operations Suite. Read on to learn more.

  • Tanium for IT Asset Visibility: Optimize Resource Utilization

    Sponsored by: Tanium

    With 68%of enterprises getting at least 1 software audit request annually, asset visibility and management is more critical than ever. In this solution brief, explore the importance of asset management, and discover Tanium’s platform for IT asset visibility. Read on to get started.

  • How Barclays Improved IT Security with the Tanium Communications Architecture

    Sponsored by: Tanium

    Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey.

  • Tanium for Detection and Response: Effectively Address and Remediate Incidents

    Sponsored by: Tanium

    Endpoint detection response (EDR) tool effectiveness can be measured by 3 key attributes: the scope of data it provides, its performance and scalability, and its flexibility. In this solution brief, dive deeper into each of the features that distinguish effective EDR tools. Continue reading to learn more.

  • Transforming Cybersecurity Strategy for the Age of IoT

    Sponsored by: Forescout

    In a recent study, the Forescout Research Team looks to better understand the current risks and threats by looking at the IoT in a smart building. The report outlines 3 strategies an attacker might use and discusses ways to mitigate them. Read on to dive deeper into the key findings.

  • Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform

    Sponsored by: enSilo

    With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.

  • Endpoint Security Buyer’s Guide: Protect, Detect, Respond

    Sponsored by: Tanium

    Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities

    Sponsored by: Fidelis

    When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.

  • Cisco Umbrella: Reporting You Can Count On

    Sponsored by: Cisco Umbrella

    Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities (video)

    Sponsored by: Fidelis

    In this video, Matt Bromiley, SANS Analyst and Incident Responder, and Gerald Mancini, Senior Vice President of Engineering at Fidelis, discuss elevating enterprise security with Fidelis Cybersecurity in the endpoint security platform. Watch to learn more.

  • Best Practices for Physical Server and Endpoint Backup

    Sponsored by: Veeam Software

    In this webcast, Veeam Senior Director of Product Strategy Rick Vanover shares best practices for physical server and endpoint backup, as well as showcases how the Veeam Agents for Windows and Linux can help organizations keep physical data available.

  • Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis® Risk Solutions

    In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • Mobile Fraud Detection: Top 4 Threats to the Mobile Channel

    Sponsored by: LexisNexis® Risk Solutions

    As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.

  • Understanding the Mobile Threat Landscape

    Sponsored by: IBM

    With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.

  • Morphisec 2019 Hospitality Guest Cybersecurity Threat Index

    Sponsored by: Morphisec, Inc.

    As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.