ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Trend Micro Endpoint Comparative Report Performed by AV-Test.org

    Sponsored by: Trend Micro, Inc.

    In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.

  • Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec

    Sponsored by: Symantec Corporation

    Symantec can help you meet the migration challenge—and capture the opportunity. Read this overview to learn more.

  • E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime

    Sponsored by: ArcSight, an HP Company

    When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.

  • Symantec 2010 SMB Information Protection Survey

    Sponsored by: Symantec Corporation

    Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.

  • Presentation Transcript: Making Time for Endpoint Security

    Sponsored by: BigFix

    This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.

  • IT Decision Checklist: Virtual Desktop Infrastructure Security

    Sponsored by: Trend Micro

    Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.

  • Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments

    Sponsored by: Trend Micro, Inc.

    This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure.

  • IPv6: The Next IP Standard

    Sponsored by: AT&T Corp

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • Lumension Endpoint Management and Security Suite

    Sponsored by: Lumension

    A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  • Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection

    Sponsored by: Trend Micro, Inc.

    Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  

  • E-Book: Engineering the Wireless Hospital

    Sponsored by: TechTarget Health IT

    Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet, Inc.

    This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

  • Total Economic Impact™ of Trend Micro Enterprise Security

    Sponsored by: Trend Micro, Inc.

    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.

  • Why Your Organization Needs to Implement DLP

    Sponsored by: Trend Micro, Inc.

    Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.

  • When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure

    Sponsored by: Trend Micro, Inc.

    Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.

  • Intrusion Defense Firewall: Network-Level HIPS at the Endpoint

    Sponsored by: Trend Micro, Inc.

    This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.

  • Top 5 Threat Protection Best Practices

    Sponsored by: Sophos

    Today’s corporate networks face a barrage of threats, from malware to accidental data loss. The endpoints receive the brunt of these attacks, and if they are not protected they can serve as a threat portal to the entire network. This paper offers advice to help you protect your endpoints and your network against an ever-growing body of threats.

  • Information Security Magazine – June 2010: Laptop Lockdown

    Sponsored by: Information Security Magazine

    This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • E-Book: New Rules for HIPAA

    Sponsored by: TechTarget Security

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • How to Let Staff Use Their Personal Technology Securely

    Sponsored by: AVG Technologies USA, Inc.

    Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely.

  • Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer

    Sponsored by: Intel

    For every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Information Security Magazine - April 2010: Endpoints on the Loose

    Sponsored by: Information Security Magazine

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.