ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Smart Protection Complete

    Sponsored by: Trend Micro

    In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.

  • Steps to secure endpoints against threats.

    Sponsored by: Cisco Umbrella

    With this critical infrastructure, applications, and sensitive data now stored in the cloud, attackers have even more incentive to target endpoints as their easiest point of entry. Access this e-book to learn about an effective security solution that is simple, open, and automated.

  • 10 Endpoint Security Problems and How the Cloud Solves Them

    Sponsored by: VMware International Unlimited Company

    In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.

  • The Big Easy - 3 steps for better security

    Sponsored by: Cisco Umbrella

    In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.

  • What Is Endpoint Detection and Response (EDR)?

    Sponsored by: VMware International Unlimited Company

    As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.

  • VMware Carbon Black Cloud Endpoint Standard Next-Generation Antivirus and Behavioral EDR

    Sponsored by: VMware International Unlimited Company

    Learn how you can protect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defend your organization from today’s advanced cyberattacks.

  • Building the Business Case for Improving Endpoint Security

    Sponsored by: VMware International Unlimited Company

    According to VMware Carbon Black’s latest Global Threat Report, cyberattackers are targeting endpoints at an increasing rate. So now you must get your boss, and other executives in agreement – but how? This white paper outlines how to build a business case for endpoint security investment. Read on to get started.

  • Risk & Response: Defending Financial Institutions

    Sponsored by: VMware International Unlimited Company

    Each year, the financial industry remains at the top of the verticals targeted by hackers – who typically look to exploit endpoints. This white paper provides additional financial industry threat insights, as well as an overview of an endpoint detection and response offering that may be able to help.

  • VMware Carbon Black Cloud Customer Voice

    Sponsored by: VMware International Unlimited Company

    The VMware Carbon Black Cloud is designed to simplify threat investigation, remediation and prevention by unifying disparate security efforts into a single, cohesive platform. Read this customer voice white paper to see what users, like DraftKings and Evernote, had to say about their experience.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Getting More from Less

    Sponsored by: VMware International Unlimited Company

    In order to address the growing volume of cyberattacks, organizations are adding new tools and systems to their stack. However, each addition also increases the intricacy of the environment, making management a complex process. Read on to learn why organizations are embracing a simplified cloud-delivered endpoint security approach.

  • Replace AV Buyer’s Guide

    Sponsored by: VMware International Unlimited Company

    When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.

  • Endpoint Detection and Response (EDR) for Hybrid Deployments

    Sponsored by: VMware International Unlimited Company

    In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.

  • Decisive Technology for Decisive Moments

    Sponsored by: Thales

    Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.

  • Secure Remote Access for Employees

    Sponsored by: Thales

    In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.

  • Endpoint Defense: Security Controls to Consider Now

    Sponsored by: TechTarget

    The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.

  • Defending Your Endpoints Against Cyberattacks

    Sponsored by: TechTarget

    Phishing scams and other cyberattacks are at an all-time high, and traditional defense tactics are growing ineffective. Written by our security experts, our endpoint security e-guide helps you search, screen and select the best fit security tool for your needs. Simply complete our 5-10-minute survey to reserve your free copy.

  • NSS Labs Product Rating Report

    Sponsored by: Cybereason

    During Q1 of 2020, NSS Labs performed an independent test of Cybereason Professional V19.1.86.0. Learn how this endpoint security solution ranked in terms of false positive rates, malware and targeted attack protection, resistance to evasion, and more.

  • Looking for a WSUS Alternative

    Sponsored by: Automox

    When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.

  • MSPs Transform Their Endpoint Security

    Sponsored by: Malwarebytes

    In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.

  • 2020 Cyber Hygiene Report

    Sponsored by: Automox

    Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.

  • Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce

    Sponsored by: Automox

    Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • Avert Cyber Attacks with Proactive Endpoint Hardening

    Sponsored by: Automox

    The average cybercriminal takes just 7 days to weaponize a vulnerability, leaving IT teams little time to detect and mitigate attacks. In fact, most organizations take up to 102 days on average to deploy patches. In this white paper, learn how establishing proactive endpoint security can help decrease remediation time and ensure protection.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.