ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: TechTarget Security

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • Mobile Application Management in the BYOD Era

    Sponsored by: TechTarget Security

    This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.

  • Enterprise mobility management: Choosing the right approach and considering costs

    Sponsored by: TechTarget Security

    Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.

  • Considerations and Best Practices for Updating a Corporate BYOD Program

    Sponsored by: TechTarget Security

    In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.

  • IT Handbook: Beyond PC’s: Navigating the New End User Client Landscape

    Sponsored by: TechTarget Security

    Access this expert guide to get an in-depth understanding of the various kinds of mobile devices that your environment needs to be able to support. Learn how trends such as consumerization and bring your own device (BYOD) can be utilized to boost productivity, mobility and efficiency.

  • Mobile Device Management Systems Help Mitigate BYOD Risks

    Sponsored by: TechTarget Security

    This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Sponsored by: TechTarget Security

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

  • BYOD Platform Support: Why an iOS/Android Strategy Makes Sense

    Sponsored by: TechTarget Security

    BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.

  • BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!

  • BYOD: An Opportunity for IT Evolution

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.

  • Exploring New Features, Uses for Secure Web Gateway Appliances

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.

  • Managing Mobile Application Security in the BYO Device Era

    Sponsored by: TechTarget Security

    Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!

  • Top 5 Enterprise Mobile Security Issues

    Sponsored by: TechTarget Security

    While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!

  • The Cost and Benefits of BYOD

    Sponsored by: TechTarget Security

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Sponsored by: TechTarget Security

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • PassMark Success: Endpoint Protection

    Sponsored by: Symantec Corporation

    Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

  • 2012 Endpoint Security Best Practices Survey Results

    Sponsored by: Symantec Corporation

    This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.

  • Mobile Health Handbook: Device Security

    Sponsored by: TechTarget Health IT

    Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization.

  • Cloud Endpoint Security: Considerations for Cloud Security Services

    Sponsored by: Symantec Corporation

    This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!

  • Choosing & Managing Mobile Devices Ch.1

    Sponsored by: TechTarget Mobile Computing

    Are you prepared to face the latest mobile trends? Read this whitepaper to learn about the critical data security and employee-related challenges today's IT leaders are facing. Discover what you need to know when it comes to handling mobile devices, dealing with device diversity, and more.

  • Bringing the Network Perimeter Back From the 'Dead'

    Sponsored by: Symantec Corporation

    There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: Sophos

    This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.