Endpoint Security Research
-
Presentation Transcript: Endpoint security fundamentals
Sponsored by: SophosThis presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
-
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Sponsored by: SophosWhen moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
Presentation Transcript: Is SaaS the Future of Enterprise Security?
Sponsored by: OpenText Security SolutionsThis presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
-
Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
Sponsored by: IBMThis multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
-
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Sponsored by: Symantec CorporationWith this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
-
Symantec Endpoint Protection 11.0.3
Sponsored by: Symantec CorporationIn this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
-
Migration and Security in SOA
Sponsored by: Torry Harris Business SolutionsIt is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models.
-
Developers and Identity Services - Tackling Identity Data with Identity Hub
Sponsored by: Oracle CorporationThis paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
-
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
Sponsored by: Oracle CorporationThis paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
-
Presentation Transcript: Accelerating Return-On-Investment with Roles Management
Sponsored by: Oracle CorporationThis paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations.
-
Endpoint Threat Management: The Benefits of Cloud-Based Security Services
Sponsored by: Trend Micro, Inc.Read this short paper to learn how your organization can use a hybrid approach to acquire an endpoint security solution that consumes less CPU time, memory, disk, and network bandwidth.
-
IBM Application Security Solutions Demo
Sponsored by: IBMIBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
-
802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
Sponsored by: Juniper Networks, Inc.This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comĀCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
Total Economic Impact Of VMware Virtual Desktop Infrastructure - Healthcare Industry
Sponsored by: VMware, Inc.Find out how a VMware healthcare customer used VMware View, formerly VMware Virtual Desktop Infrastructure, to reduce costs, free up office space and increase worker productivity in its remote offices.
-
Endpoint Security and Control
Sponsored by: SophosLearn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
Cisco Secure Remote Access Solution
Sponsored by: Cisco Systems, Inc.This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
-
Clean VPN Approach to Secure Remote Access
Sponsored by: SonicWALLIn this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security.
-
Developing an Effective Corporate Mobile Policy
Sponsored by: BlackBerryBy now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
-
Citrix GoToMyPCCorporate - Security White Paper
Sponsored by: Citrix Online - GotoMyPCIn this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.