ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Top 5 Enterprise Mobile Security Issues

    Sponsored by: TechTarget Security

    While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!

  • The Cost and Benefits of BYOD

    Sponsored by: TechTarget Security

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Sponsored by: TechTarget Security

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • A Guide to MAM and Planning for BYOD Security in the Enterprise

    Sponsored by: TechTarget Security

    In this expert E-Guide from SearchConsumerization.com, discover the strategies and tools available that will help you manage and secure bring your own device (BYOD) and mobile apps in your enterprise.

  • Endpoint Protection Best Practices Manual: Combating issues, problems

    Sponsored by: TechTarget Security

    Consult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.

  • Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them

    Sponsored by: TechTarget Security

    Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.

  • Your Guide to Mobile Application Management

    Sponsored by: TechTarget Security

    This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.

  • How to Create a Mobile Security Policy

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.

  • Six Ways to Embrace IT Consumerization

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com provides the definitions of IT consumerization, what it means to your organization, and offers six best ways that you can embrace it in your workplace.

  • A Mobile Application Management Primer for IT

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.

  • Exploring new web browser security capabilities

    Sponsored by: TechTarget Security

    New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.

  • Guide to Mobile Device Management Software

    Sponsored by: TechTarget Security

    This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.

  • BYOD Policies: Key Steps to Ensure Success

    Sponsored by: TechTarget Security

    This expert E-Guide unveils the top risks inherent to BYOD and offers guidance in creating and enforcing a successful BYOD policy to ensure your enterprise remains safe and under control despite the challenges consumer-based devices bring to the workplace.

  • Mobile Data Security and Compliance Challenges in the Enterprises

    Sponsored by: TechTarget Security

    The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.

  • Enterprise Mobile Device Security Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.

  • Endpoint Management - IT handbook

    Sponsored by: TechTarget Data Center

    Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.

  • Bringing the Network Perimeter Back From the 'Dead'

    Sponsored by: Symantec Corporation

    There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: Sophos

    This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

  • Transcript: Covering the basics in MDM? Why it’s time to advance your strategy

    Sponsored by: BlackBerry

    Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Cloud-delivered Endpoint Security

    Sponsored by: OpenText Security Solutions

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • Beyond Passwords & Outdated Physical Access Systems

    Sponsored by: Entrust, Inc.

    Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.

  • Endpoint Protection Small Business Edition

    Sponsored by: Symantec Corporation

    Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.

  • Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop

    Sponsored by: SysAid Technologies Ltd

    This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.