Endpoint Security Research
-
Trend Micro Endpoint Comparative Report Performed by AV-Test.org
Sponsored by: Trend Micro, Inc.In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.
-
Overview: Endpoint Management: 7 Steps to Windows 7 with Symantec
Sponsored by: Symantec CorporationSymantec can help you meet the migration challenge—and capture the opportunity. Read this overview to learn more.
-
E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime
Sponsored by: ArcSight, an HP CompanyWhen it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.
-
Symantec 2010 SMB Information Protection Survey
Sponsored by: Symantec CorporationSmall and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more.
-
Presentation Transcript: Making Time for Endpoint Security
Sponsored by: BigFixThis presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum.
-
IT Decision Checklist: Virtual Desktop Infrastructure Security
Sponsored by: Trend MicroTraditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.
-
Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments
Sponsored by: Trend Micro, Inc.This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure.
-
IPv6: The Next IP Standard
Sponsored by: AT&T CorpWith available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
-
Lumension Endpoint Security: Device Control and Application Control
Sponsored by: LumensionThe increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
-
Lumension Endpoint Management and Security Suite
Sponsored by: LumensionA new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
-
Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
Sponsored by: Trend Micro, Inc.Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.
-
E-Book: Engineering the Wireless Hospital
Sponsored by: TechTarget Health ITImplementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet, Inc.This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
-
Total Economic Impact™ of Trend Micro Enterprise Security
Sponsored by: Trend Micro, Inc.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
-
Why Your Organization Needs to Implement DLP
Sponsored by: Trend Micro, Inc.Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
-
When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure
Sponsored by: Trend Micro, Inc.Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.
-
Intrusion Defense Firewall: Network-Level HIPS at the Endpoint
Sponsored by: Trend Micro, Inc.This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.
-
Top 5 Threat Protection Best Practices
Sponsored by: SophosToday’s corporate networks face a barrage of threats, from malware to accidental data loss. The endpoints receive the brunt of these attacks, and if they are not protected they can serve as a threat portal to the entire network. This paper offers advice to help you protect your endpoints and your network against an ever-growing body of threats.
-
Information Security Magazine – June 2010: Laptop Lockdown
Sponsored by: Information Security MagazineThis month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
-
Threatsaurus: The A-Z of Computer and Data Security Threats
Sponsored by: Sophos UKWhether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
-
E-Book: New Rules for HIPAA
Sponsored by: TechTarget SecurityOrganizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
-
How to Let Staff Use Their Personal Technology Securely
Sponsored by: AVG Technologies USA, Inc.Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely.
-
Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer
Sponsored by: IntelFor every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.
-
Data Loss Prevention for IBM i
Sponsored by: Innovatum, Inc.Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
-
Information Security Magazine - April 2010: Endpoints on the Loose
Sponsored by: Information Security MagazineThis month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.