ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Information Security Essential Guide: Strategies for Tackling BYOD

    Sponsored by: TechTarget Security

    Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.

  • Cloud Endpoint Security: Considerations for Cloud Security Services

    Sponsored by: TechTarget Security

    This e-guide from our experts at SearchSecurity.com will share some important information you should know about cloud-enabled security offerings, including the benefits of a cloud-based console and the factors you need to consider when evaluating products.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!

  • Solving the Challenges of BYOD

    Sponsored by: TechTarget Security

    This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.

  • Unlocking the Opportunity of SIEM Technology

    Sponsored by: TechTarget Security

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: TechTarget Security

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • How a next-generation firewall prevents application-layer attacks

    Sponsored by: TechTarget Security

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: TechTarget Security

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Mobile Device Security Lacking in Most Hospital Policy Discussions

    Sponsored by: Essextec

    This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.

  • User-Based Licensing for Endpoint Protection and BYOD

    Sponsored by: OpenText Security Solutions

    User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.

  • Network Security Visibility and Analysis Technical Guide

    Sponsored by: TechTarget Security

    This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.

  • Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    Sponsored by: OpenText Security Solutions

    This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.

  • Choosing an MDM System: Fundamental Features for Success

    Sponsored by: Fiberlink

    This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.

  • Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices

    Sponsored by: SpectorSoft

    Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!

  • The Hay Group Case Study

    Sponsored by: CenterBeam

    This brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.

  • Case Study - System One

    Sponsored by: OpenText Security Solutions

    This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.

  • IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Sponsored by: OpenText Security Solutions

    In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

  • How iOS Encryption and Data Protection Work

    Sponsored by: Symantec Corporation

    This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.

  • Enterprise Mobility Management Options to Keep Corporate Data Safe

    Sponsored by: MobileIron

    This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.

  • Responding to—and recovering from—sophisticated security attacks

    Sponsored by: IBM

    In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.

  • Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.

    Sponsored by: Insight

    Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Next-Generation IPS for Dummies

    Sponsored by: Sourcefire

    Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.