ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • The Future of Security Operations

    Sponsored by: IBM

    As technology changes and attack surfaces grow, security teams are forced to think differently. Leverage this resource to learn about the future of security operations and how your team can more effectively operationalize world-class security practices.

  • The Future of Network Security is in the Cloud

    Sponsored by: Cisco Umbrella

    Find out how Gartner defines the Secure Access Service Edge (SASE), and what steps they recommend for security and risk management leaders to manage change in their organizations. In this new report, you'll receive recommendations on how to adopt integrated cloud-delivered security services that are simple, scalable, and flexible.

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Sponsored by: Intertrust

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Menlo Security

    Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.

  • Isolation: Separating Malware from the Network, Not Devices

    Sponsored by: Menlo Security

    As data breaches grow increasingly common, the need for network security has become essential. Many organizations are adopting separation tactics to protect their network, but what if there was a better way to protect your endpoints? In this white paper, go in-depth into the benefits and faults of isolation and network separation.

  • Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform

    Sponsored by: enSilo

    With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Apcela

    Network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders should consider a converged, cloud-delivered, secure access service edge to address this shift.

  • Cisco Umbrella: Reporting You Can Count On

    Sponsored by: Cisco Umbrella

    Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.

  • Best Practices for Physical Server and Endpoint Backup

    Sponsored by: Veeam Software

    In this webcast, Veeam Senior Director of Product Strategy Rick Vanover shares best practices for physical server and endpoint backup, as well as showcases how the Veeam Agents for Windows and Linux can help organizations keep physical data available.

  • Morphisec 2019 Hospitality Guest Cybersecurity Threat Index

    Sponsored by: Morphisec, Inc.

    As Morphisec continues to assist hospitality providers with improving defenses and protecting customer financial data and personal information, they decided to examine how the threat of cyberattacks is impacting the mindset of consumers. Download Morphisec’s 2019 Hospitality Guest Cybersecurity Threat Index report to see what they found.

  • Cybercrime The New Downtime Threat to SMBs

    Sponsored by: Avast Software

    A growing number of small to medium-sized businesses are falling victim to cybercrime. However, not all SMBs are aware of the risks and implications. In this infographic, learn why SMBs need a proactive security strategy that includes services that protect data, devices and people to eliminate gaps in protection.

  • AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD

    Sponsored by: PortSys

    Antivirus is a great technology for helping to protect devices. But how does antivirus protection differ from say, managed secure access when it comes to mobile devices? Download and discover the answers in fewer than four minutes with this revealing blog post.

  • Patch Management: Your Biggest Ally in the War Against Cybercrime

    Sponsored by: Panda Security

    The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.

  • UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up

    Sponsored by: PortSys

    US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.

  • Case Study: Electronic Manufacturing

    Sponsored by: enSilo

    A manufacturing enterprise's pre-existing AV was getting bypassed by malicious activity. As a result, the enterprise was seeking an endpoint security solution to protect their data from external cyberattacks. In this case study, learn how the manufacturing enterprise was able to provide the necessary protection when deploying enSilo.

  • Manufacturing Solution Brief

    Sponsored by: enSilo

    The manufacturing industry has been heavily targeted by cyberattacks in recent years. Download this solution brief to learn how enSilo delivers a complete endpoint protection platform that is able to uniquely meet the security and operational needs of the manufacturing industry.

  • Fidelis Endpoint : A Technical Deep Dive

    Sponsored by: Fidelis

    In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.

  • Optimizing the Security Stack

    Sponsored by: Morphisec, Inc.

    In this white paper, examine the optimal way to protect endpoints from both known and unknown attacks and review the Windows Defender Antivirus offering.

  • Red Cloak Threat Detection & Responses

    Sponsored by: Dell SecureWorks

    Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.

  • Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC

    Sponsored by: PortSys

    Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.

  • Protecting Point-of-Sale Systems

    Sponsored by: Morphisec, Inc.

    With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.

  • Are You Getting What You Were Promised?

    Sponsored by: Cisco Umbrella

    Are you getting what you were promised? People make a lot of claim about network security but Cisco would rather show you proof. Download this infographic to learn about Cisco Umbrella including how it compares to other vendors and what Cisco customers are saying.

  • Insurer Prevents Losses from Fake Quotes

    Sponsored by: Shape Security

    A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.

  • 6 Degrees of Network Security

    Sponsored by: Cisco Umbrella

    A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.