ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • IT in Europe - May 2012

    Sponsored by: TechTarget Security

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

  • Mobile Device Security Best Practices for BYOD

    Sponsored by: TechTarget Security

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

  • Expert Tips for Managing Mobile Devices in the Enterprise

    Sponsored by: TechTarget Security

    Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.

  • Best Practices for Mobile Device Management

    Sponsored by: TechTarget Security

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

  • The Consumerization of IT 101

    Sponsored by: TechTarget Security

    Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT.

  • Enterprise Antivirus Security: How Does Your Solution Stack Up?

    Sponsored by: OpenText Security Solutions

    Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

  • Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops

    Sponsored by: Trusteer

    Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense.

  • Four Things You Should Know About Securing Your Growing Business

    Sponsored by: Symantec Corporation

    SMBs may not have the same resources as their enterprise counterparts, but they face the same threats. In the resource, uncover 4 things you should know about securing your growing business and how to protect all points of your organizations more efficiently, without straining your resources.

  • Defending Systems on a Wide-open Network with Symantec Endpoint Protection

    Sponsored by: Symantec Corporation

    Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.

  • 2012 Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Today’s SMBs are increasingly forced to invest in new measures to protect their endpoints and their business from cyber threats. This resource explores key findings from the Symantec 2012 Endpoint Security Survey and offers best practices and recommendations for reducing the risk of a successful cyber attack.

  • IT Security: Built-In Protection with Intel vPro Technology

    Sponsored by: Intel

    New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.

  • Bringing Order to the Chaos of “Bring Your Own Device”

    Sponsored by: Enterasys

    In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.

  • Enabling High Performance for Apple iPads in the Enterprise

    Sponsored by: Aruba Networks

    Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.

  • Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers

    Sponsored by: Bit9, Inc.

    Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.

  • Kaspersky Endpoint Security 8 for Windows

    Sponsored by: Kaspersky

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • About to Buy: Mobile Device Management Software

    Sponsored by: GroupLogic

    Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software.

  • Network Evolution E-Zine: Network security in a world of mobile workers

    Sponsored by: TechTarget Networking

    In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.

  • Understanding Mobility Trends and Mobile Usage Among Business Users

    Sponsored by: iPass Inc.

    Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.

  • The Ten "Must Haves" for Secure Mobile Device Management

    Sponsored by: Zenprise

    Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

  • Tips for planning and executing a migration to Windows 7

    Sponsored by: MCPc

    Migrating hundreds of desktops to Windows 7 can be a grueling task. This essential e-guide presents the top challenges associated with a Windows 7 migration. Discover why you should plan your move in two phases: planning and execution, and learn how to keep these two phases separate.

  • Providing effective endpoint management at the lowest total cost

    Sponsored by: IBM

    Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.

  • The Age of Agility: Business Intelligence for your Business

    Sponsored by: IBM

    Be the first to check out the inaugural issue of Click, an e-zine full of insightful articles dedicated to helping you discover the business and IT solutions that work well for you. This edition is packed with vital information on everything from business intelligence (BI) and cloud computing to collaboration and social networking tools.

  • Mobility Solutions

    Sponsored by: Azzurri

    Enabling and supporting mobility can be complicated, especially when it comes to integrating it with company policy. Discover how a mobility solution can help you with all this.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.