Endpoint Security Research
-
Information Security Essential Guide: Strategies for Tackling BYOD
Sponsored by: TechTarget SecurityLet this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
-
Cloud Endpoint Security: Considerations for Cloud Security Services
Sponsored by: TechTarget SecurityThis e-guide from our experts at SearchSecurity.com will share some important information you should know about cloud-enabled security offerings, including the benefits of a cloud-based console and the factors you need to consider when evaluating products.
-
Secure Web Gateway Overview: Implementation Best Practices
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
-
Solving the Challenges of BYOD
Sponsored by: TechTarget SecurityThis expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
-
Unlocking the Opportunity of SIEM Technology
Sponsored by: TechTarget SecurityExplore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
PCI Council issues mobile application rules for software developers
Sponsored by: TechTarget SecurityThe Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
-
How a next-generation firewall prevents application-layer attacks
Sponsored by: TechTarget SecurityThe application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
Improving Enterprise Email Security: Systems and Tips
Sponsored by: TechTarget SecurityThis expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
-
Mobile Device Security Lacking in Most Hospital Policy Discussions
Sponsored by: EssextecThis expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
-
User-Based Licensing for Endpoint Protection and BYOD
Sponsored by: OpenText Security SolutionsUser-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
-
Network Security Visibility and Analysis Technical Guide
Sponsored by: TechTarget SecurityThis TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
-
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
Sponsored by: OpenText Security SolutionsThis performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
-
Choosing an MDM System: Fundamental Features for Success
Sponsored by: FiberlinkThis essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
-
Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
Sponsored by: SpectorSoftSpector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
-
The Hay Group Case Study
Sponsored by: CenterBeamThis brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.
-
Case Study - System One
Sponsored by: OpenText Security SolutionsThis brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
-
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
Sponsored by: OpenText Security SolutionsIn this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
-
How iOS Encryption and Data Protection Work
Sponsored by: Symantec CorporationThis expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
-
Enterprise Mobility Management Options to Keep Corporate Data Safe
Sponsored by: MobileIronThis guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
-
Responding to—and recovering from—sophisticated security attacks
Sponsored by: IBMIn this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
-
Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
Sponsored by: InsightRead on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
-
Sophos EndUser Protection Overview
Sponsored by: SophosThis two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
-
Next-Generation IPS for Dummies
Sponsored by: SourcefireDespite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
-
May Information Security Magazine
Sponsored by: TechTarget SecurityThis month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
-
SymEd Solutions from Symantec: Endpoint Management and Mobility
Sponsored by: Insight Public Sector and SymantecUncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.