Endpoint Security Research
-
Biometrics in the enterprise: An opportunity or an ethical minefield?
Sponsored by: TechTarget ComputerWeekly.comIs biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
-
Why EDR Technologies are Essential for Endpoint Protection
Sponsored by: TechTarget SecurityWhile an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
-
4 Top Identity and Access Management Trends
Sponsored by: OnfidoAs end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
-
Crafting a Secure Endpoint Management Strategy
Sponsored by: Vox Mobile SolutionsDownload this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
-
Evaluate Desktop Management Tools
Sponsored by: Dell TechnologiesDownload this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.
-
Desktop & Endpoint Management: Tools and Best Practices
Sponsored by: Dell TechnologiesDownload this E-guide to learn how unified endpoint management (UEM) and other tools and best practices can ease desktop management for IT.
-
Fundamentals of Endpoint Security: Anti-Malware Protection
Sponsored by: CitrixAccess this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
-
CISOs Map Out Their 2018 Cybersecurity Plans
Sponsored by: TechTarget SecurityAs attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
-
Build Multilayered Defense for the Cloud and Endpoints
Sponsored by: ConvergeOneCreating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
-
Optimizing Endpoint Security for the Enterprise
Sponsored by: ConvergeOneGiven the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.
-
CISOs Map Out Their 2018 Cybersecurity Plans
Sponsored by: TechTarget SecurityAs attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
-
Endpoint Protection & Device Management
Sponsored by: SeqriteThe endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
Explore the latest enterprise mobile security technology
Sponsored by: TechTarget Mobile ComputingAs cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
-
Privileged Account Security
Sponsored by: CyberArk55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
-
IT Security Trends to Know
Sponsored by: Cisco UmbrellaThe 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.
-
Could the WannaCry Decryptor Work on Other Ransomware Strains?
Sponsored by: Cisco UmbrellaAfter the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
-
Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway
Sponsored by: Cisco UmbrellaCisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.
-
Improve Endpoint Security with Advanced Tools and Techniques
Sponsored by: OPSWAT incBetter endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
The role of Apple device management in modern business
Sponsored by: JAMFMany organizations rely on unified endpoint management for a variety of devices, but there's also a space for Apple device management in the modern enterprise. In this e-guide you'll discover new management support features for Apple devices and how they are making these devices more productive as business tools.
-
How to Bolster Endpoint Security Protection
Sponsored by: SymantecThis expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
-
The Risks and Flaws of Open Source Security
Sponsored by: Flexera SoftwareIs open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.
-
Is the Endpoint Security Nightmare Ending?
Sponsored by: TechTarget SecurityIn our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
Sponsored by: BlackBerryToday an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.