ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

  • Mitigations for Mobile Phishing Problems on the iOS Platform

    Sponsored by: SearchSecurity.com

    Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.

  • Solving the Challenges of BYOD

    Sponsored by: SearchSecurity.com

    This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.

  • Unlocking the Opportunity of SIEM Technology

    Sponsored by: SearchSecurity.com

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

  • PCI Council issues mobile application rules for software developers

    Sponsored by: SearchSecurity.com

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • How a next-generation firewall prevents application-layer attacks

    Sponsored by: SearchSecurity.com

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: SearchSecurity.com

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Discover the Risks and Rewards Behind a Mobile Workforce

    Sponsored by: SearchSecurity.com

    Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.

  • Mobile Application Management in the BYOD Era

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.

  • Enterprise mobility management: Choosing the right approach and considering costs

    Sponsored by: SearchSecurity.com

    Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.

  • Weighing the Risks, Challenges and Benefits Before Diving into BYOD

    Sponsored by: SearchSecurity.com

    This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!

  • Considerations and Best Practices for Updating a Corporate BYOD Program

    Sponsored by: SearchSecurity.com

    In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.

  • IT Handbook: Beyond PC’s: Navigating the New End User Client Landscape

    Sponsored by: SearchSecurity.com

    Access this expert guide to get an in-depth understanding of the various kinds of mobile devices that your environment needs to be able to support. Learn how trends such as consumerization and bring your own device (BYOD) can be utilized to boost productivity, mobility and efficiency.

  • How Cloud-Based Mobile Device Security Streamlines Data Protection

    Sponsored by: SearchSecurity.com

    Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.

  • Mobile Device Management Systems Help Mitigate BYOD Risks

    Sponsored by: SearchSecurity.com

    This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.

  • Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.

    Sponsored by: Insight

    Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Next-Generation IPS for Dummies

    Sponsored by: Sourcefire

    Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

  • May Information Security Magazine

    Sponsored by: SearchSecurity.com

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • Security in the Age of Mobility

    Sponsored by: Trend Micro

    This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.

  • PassMark Success: Endpoint Protection

    Sponsored by: Symantec Corporation

    Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

  • 2012 Endpoint Security Best Practices Survey Results

    Sponsored by: Symantec Corporation

    This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.