Endpoint Security Research
-
Endpoint Security IT Decision Center Handbook 1
Sponsored by: TechTarget SecurityAccess this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
-
Mobility is here to stay – Is your data is backed up?
Sponsored by: TechTarget Data BackupRemote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
-
Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud
Sponsored by: TechTarget SecurityIn this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy.
-
Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
Sponsored by: OpenText Security SolutionsThis expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
Emerging Security Trends and Risks: Insights for the Business Executive
Sponsored by: IBMThis report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
-
File Sync and Share: Recent Developments and Points to Address in your Usage Policy
Sponsored by: Dropbox for BusinessThis e-guide recounts the latest advances in enterprise collaboration technology and explains why security remains a top priority for the companies that leverage it. Read on to learn more.
-
Why the Endpoint Must be the New Security Focus
Sponsored by: Bit9, Inc.Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.
-
Endpoint Security Technology
Sponsored by: Symantec CorporationAccess this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
-
A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMAccess this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
File Sync and Share: Risks, Rewards, Considerations, and Deployment Options
Sponsored by: Dropbox for BusinessThis e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.
-
How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
Sponsored by: Bit9, Inc.Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
-
Mobility Mayhem: Balancing BYOD with Enterprise Security
Sponsored by: Code42Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.
-
How to take Advantage of Security Ops that go Beyond the OS
Sponsored by: Intel and McAfeeIn this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
-
Symantec Intelligence Report - August 2013
Sponsored by: Symantec CorporationIn this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
-
Endpoint Security: Anti-Virus Alone is Not Enough
Sponsored by: LumensionAccess this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
-
Weaponized malware now threatens the private sector
Sponsored by: LumensionAccess this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
TechGuide: Endpoint Security Management
Sponsored by: TechTarget SecurityThis expert e-guide will help you sort through your endpoint security management troubles by redefining and transitioning your strategy to fit the growing requirement for defending against malware.
-
Determining the Most Effective Endpont Management
Sponsored by: IBMThis white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
-
3 Cloud Backup Services Ease Protection of Laptops
Sponsored by: Code42This e-guide examines three types of cloud backup services and the key factors you need to consider when evaluating them.
-
September Information Security Magazine
Sponsored by: TechTarget SecurityIndustry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
-
Crucial Enterprise Endpoint Backup Requirements
Sponsored by: Code42This crucial paper provides a helpful checklist of the requirements an enterprise endpoint backup strategy needs to satisfy in order to properly and successfully protect the data stored on your endpoints.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.