Endpoint Security Research
-
Presentation Transcript: Revelations and Realities of Endpoint Security
Sponsored by: GFI SoftwareCompanies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.
-
AppSense User Virtualization Platform
Sponsored by: AppSenseAmong a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.
-
Securely Publish and Manage Web APIs with CloudControl
Sponsored by: Layer 7 TechnologiesCloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.
-
The Case For Endpoint Data Protection
Sponsored by: CibecsCibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C
-
Maintaining Continuous Compliance – a new best practice approach
Sponsored by: IBMWhen trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
-
Rewriting the Rules of Patch Management
Sponsored by: IBMIn the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.
-
A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing
Sponsored by: Trend Micro, Inc.This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.
-
Making Desktop Virtualization Part of Your Windows 7 Migration
Sponsored by: Dell SoftwareMost organizations are migrating to Windows 7 – it’s powerful and full of new functionality. However, this migration promises to be complex, time-consuming, expensive and create downtime for users. In this white paper, see how adopting desktop virtualization simplifies your Windows 7 migration – while reducing costs and increasing security.
-
Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
Sponsored by: Mainline Information SystemsThis presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
-
Symantec Endpoint Protection Small Business Edition 12
Sponsored by: Symantec CorporationSymantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
-
Symantec Endpoint Protection 12
Sponsored by: Symantec CorporationSymantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
-
2010 Endpoint Risk Assessment: Internal Vulnerabilities
Sponsored by: PromisecThis study will show you the most common security issues that were found and how they were dealt with by the various organizations.
-
Comparative Analysis on Endpoint Security Solutions
Sponsored by: Trend MicroAs the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
-
Top 5 Threat Protection Best Practices
Sponsored by: SophosThe following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.
-
Focus on Endpoint Data Protection
Sponsored by: DruvaWhether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
-
Why Customers Love VIPRE Business
Sponsored by: GFI SoftwareThis paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.
-
Protecting Against the New Wave of Malware
Sponsored by: GFI SoftwareManaging threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.
-
How Can You Prepare for the Consumerization of IT
Sponsored by: DynTek & McAfeeThe consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.
-
Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
Sponsored by: VeriSign EMEAThis white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
-
How Security is Changing to Support Virtualization and Cloud Computing
Sponsored by: Trend Micro, Inc.In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.
-
IT Decision Checklist: Virtual Desktop Infrastructure Security
Sponsored by: AstaroVDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.
-
Expert Guide to Securing Emerging Endpoints
Sponsored by: TechTarget SecurityEncrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.
-
Take Back the Endpoint
Sponsored by: KasperskyDuring the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
-
February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”
Sponsored by: Information Security MagazineThis month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.
-
Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
Sponsored by: Trend Micro, Inc.An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.