ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Presentation Transcript: Revelations and Realities of Endpoint Security

    Sponsored by: GFI Software

    Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.

  • AppSense User Virtualization Platform

    Sponsored by: AppSense

    Among a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.

  • Securely Publish and Manage Web APIs with CloudControl

    Sponsored by: Layer 7 Technologies

    Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs.

  • The Case For Endpoint Data Protection

    Sponsored by: Cibecs

    Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C

  • Maintaining Continuous Compliance – a new best practice approach

    Sponsored by: IBM

    When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.

  • A Brave New (Security) World: How Security is Changing to Support Virtualization and Cloud Computing

    Sponsored by: Trend Micro, Inc.

    This white paper describes the evolution of security challenges as enterprises adopt virtualization and then cloud computing. Learn about an approach that acts as a facilitator of mobility, virtualization, and cloud computing.

  • Making Desktop Virtualization Part of Your Windows 7 Migration

    Sponsored by: Dell Software

    Most organizations are migrating to Windows 7 – it’s powerful and full of new functionality. However, this migration promises to be complex, time-consuming, expensive and create downtime for users. In this white paper, see how adopting desktop virtualization simplifies your Windows 7 migration – while reducing costs and increasing security.

  • Tivoli Endpoint Manager: Continuous Compliance in a Distributed World

    Sponsored by: Mainline Information Systems

    This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • 2010 Endpoint Risk Assessment: Internal Vulnerabilities

    Sponsored by: Promisec

    This study will show you the most common security issues that were found and how they were dealt with by the various organizations.

  • Comparative Analysis on Endpoint Security Solutions

    Sponsored by: Trend Micro

    As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.

  • Top 5 Threat Protection Best Practices

    Sponsored by: Sophos

    The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.

  • Focus on Endpoint Data Protection

    Sponsored by: Druva

    Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.

  • Why Customers Love VIPRE Business

    Sponsored by: GFI Software

    This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.

  • Protecting Against the New Wave of Malware

    Sponsored by: GFI Software

    Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.

  • How Can You Prepare for the Consumerization of IT

    Sponsored by: DynTek & McAfee

    The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.

  • Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

    Sponsored by: VeriSign EMEA

    This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.

  • How Security is Changing to Support Virtualization and Cloud Computing

    Sponsored by: Trend Micro, Inc.

    In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.

  • IT Decision Checklist: Virtual Desktop Infrastructure Security

    Sponsored by: Astaro

    VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.

  • Expert Guide to Securing Emerging Endpoints

    Sponsored by: TechTarget Security

    Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.

  • Take Back the Endpoint

    Sponsored by: Kaspersky

    During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

  • February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”

    Sponsored by: Information Security Magazine

    This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.

  • Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security

    Sponsored by: Trend Micro, Inc.

    An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.