ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • 2020 Remote Workforce Cybersecurity Guide

    Sponsored by: Automox

    The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.

  • Guide to AV Replacement

    Sponsored by: Crowdstrike

    As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.

  • Telstra Mobile Security Report

    Sponsored by: Telstra

    Each year, Telstra conducts a study into the current threats and trends within the mobile security landscape, specifically looking at how these landscapes compare in Australia vs the rest of the world. Download this white paper to uncover the findings from this year’s report.

  • Your Guide to COVID-19-Related Threats

    Sponsored by: TechTarget

    Amid the existing uncertainty of the current pandemic, it's unfortunate – but not surprising – to see an increase in cyberattack campaigns using the coronavirus as an entry point. This expert guide, The Cybersecurity Professional's Guide to Pandemic-Related Threats, explores the various threats to watch out for and highlights

  • Smart Protection Complete

    Sponsored by: Trend Micro

    In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.

  • 10 Endpoint Security Problems and How the Cloud Solves Them

    Sponsored by: VMware International Unlimited Company

    In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.

  • What Is Endpoint Detection and Response (EDR)?

    Sponsored by: VMware International Unlimited Company

    As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.

  • VMware Carbon Black Cloud Endpoint Standard Next-Generation Antivirus and Behavioral EDR

    Sponsored by: VMware International Unlimited Company

    Learn how you can protect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defend your organization from today’s advanced cyberattacks.

  • Building the Business Case for Improving Endpoint Security

    Sponsored by: VMware International Unlimited Company

    According to VMware Carbon Black’s latest Global Threat Report, cyberattackers are targeting endpoints at an increasing rate. So now you must get your boss, and other executives in agreement – but how? This white paper outlines how to build a business case for endpoint security investment. Read on to get started.

  • Risk & Response: Defending Financial Institutions

    Sponsored by: VMware International Unlimited Company

    Each year, the financial industry remains at the top of the verticals targeted by hackers – who typically look to exploit endpoints. This white paper provides additional financial industry threat insights, as well as an overview of an endpoint detection and response offering that may be able to help.

  • VMware Carbon Black Cloud Customer Voice

    Sponsored by: VMware International Unlimited Company

    The VMware Carbon Black Cloud is designed to simplify threat investigation, remediation and prevention by unifying disparate security efforts into a single, cohesive platform. Read this customer voice white paper to see what users, like DraftKings and Evernote, had to say about their experience.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Getting More from Less

    Sponsored by: VMware International Unlimited Company

    In order to address the growing volume of cyberattacks, organizations are adding new tools and systems to their stack. However, each addition also increases the intricacy of the environment, making management a complex process. Read on to learn why organizations are embracing a simplified cloud-delivered endpoint security approach.

  • Replace AV Buyer’s Guide

    Sponsored by: VMware International Unlimited Company

    When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.

  • Endpoint Detection and Response (EDR) for Hybrid Deployments

    Sponsored by: VMware International Unlimited Company

    In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.

  • Decisive Technology for Decisive Moments

    Sponsored by: Thales

    Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.

  • Secure Remote Access for Employees

    Sponsored by: Thales

    In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.

  • Endpoint Defense: Security Controls to Consider Now

    Sponsored by: TechTarget

    The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.

  • Defending Your Endpoints Against Cyberattacks

    Sponsored by: TechTarget

    Phishing scams and other cyberattacks are at an all-time high, and traditional defense tactics are growing ineffective. Written by our security experts, our endpoint security e-guide helps you search, screen and select the best fit security tool for your needs. Simply complete our 5-10-minute survey to reserve your free copy.

  • NSS Labs Product Rating Report

    Sponsored by: Cybereason

    During Q1 of 2020, NSS Labs performed an independent test of Cybereason Professional V19.1.86.0. Learn how this endpoint security solution ranked in terms of false positive rates, malware and targeted attack protection, resistance to evasion, and more.

  • Looking for a WSUS Alternative

    Sponsored by: Automox

    When Windows Service Update Services (WSUS) was released in 2003, it was revolutionary in automating patch management, which was largely a manual task until then. However, after nearly two decades, it’s time to consider a successor for WSUS – read this article to explore a few potential alternatives.

  • MSPs Transform Their Endpoint Security

    Sponsored by: Malwarebytes

    In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.

  • 2020 Cyber Hygiene Report

    Sponsored by: Automox

    Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.

  • Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce

    Sponsored by: Automox

    Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.