ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Industrial Giant Discovers 200,000 Network Endpoints in One Day

    Sponsored by: Beta Systems

    One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.

  • The Cost of a Data Breach in Healthcare

    Sponsored by: Absolute Software Corporation

    Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.

  • Bovis Homes

    Sponsored by: Absolute Software Corporation

    In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.

  • Business Infrastructure Control System – BICS

    Sponsored by: Beta Systems

    Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.

  • Network Security Management for IT and Industrial Networks

    Sponsored by: Beta Systems

    Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.

  • Core - DNS - Threat Intelligence – the new driver for incident response

    Sponsored by: Cisco Umbrella

    Malware attacks in the financial services industry have grown considerably over the past year. Organizations are finding that they require complete network visibility to consolidate disparate security efforts and establish a strong resiliency program. In this webinar, discover the foremost threats of 2019 and how integrated security can help.

  • Cybersecurity and Education: The State of the Digital District in 2020

    Sponsored by: Absolute Software Corporation

    Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.

  • L.A. Tourism and Convention Board

    Sponsored by: Absolute Software Corporation

    As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.

  • Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop

    Sponsored by: Cisco Umbrella

    It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.

  • CJIS Security Policy Evaluation Guide

    Sponsored by: Absolute Software Corporation

    IT and Information Security teams need to be equipped with powerful, versatile tools that will allow them to increase their operational efficiency. Download this overview to see how Absolute helps protect regulated data, eliminate compliance failures, and respond rapidly to security exposures.

  • Rethinking Data Protection: The Human-centric Approach

    Sponsored by: Forcepoint

    It’s predicted that there will be 1.87 billion mobile workers worldwide by 2022, representing 42.5% of the global workforce. As mobile devices grow, the idea of a traditional perimeter begins to fade. Download this e-book and learn why organizations are adopting a user & data-centric approach to multi-cloud security.

  • Securing Your Wherever Whenever Workforce

    Sponsored by: Forcepoint

    Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.

  • SIG - Security Readout: 2019 Trends for Remote and Roaming User Security

    Sponsored by: Cisco Umbrella

    In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.

  • Core - DNS - The Big Easy - 3 steps to better security

    Sponsored by: Cisco Umbrella

    When it comes to cybersecurity, there are 3 main ‘ways’ in which data breaches occur. In this webinar, take a closer look at the top challenge areas facing IT security teams, and discover the 3 methods in which attacks happen & how to stop them.

  • Egress Email and File Protection is cream of the crop for Farm Credit Mid-America

    Sponsored by: Egress Software Technologies Inc

    Taking inspiration from the internal system security best practices used by financial organizations, this case study follows the journey of Farm Credit Mid-America as they partner with Egress to proactively establish an email and file security for ensuring the protection of sensitive data.

  • Industrial control systems (ICS) are all around us

    Sponsored by: Cisco

    Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.

  • The New Norm: Trend Micro Security Predictions for 2020

    Sponsored by: Trend Micro

    Industry experts at Trend Micro recently conducted research into past cybersecurity trends to develop their predictions for ever-evolving landscape of cybersecurity threats and defense methods in 2020 and beyond. Continue to read the full report.

  • Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way

    Sponsored by: Malwarebytes

    This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.

  • Board Ready Endpoint Resilience in 5 Steps

    Sponsored by: Malwarebytes

    The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.

  • Why automation is essential for cyber resilience

    Sponsored by: Malwarebytes

    While digital transformation equips organizations to be more productive, it also exposes networks to potential threats. This data sheet outlines key insights into the current cybersecurity landscape and highlights why organizations should consider including automation into their strategy.

  • Malwarebytes Endpoint Protection & Response (EDR)

    Sponsored by: Malwarebytes

    According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.

  • Building supply company boosts endpoint security with Malwarebytes

    Sponsored by: Malwarebytes

    In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.

  • A Modern Approach to Endpoint Remediation

    Sponsored by: Malwarebytes

    According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.

  • Endpoint Protection

    Sponsored by: Malwarebytes

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

  • Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints

    Sponsored by: Cisco Umbrella

    An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.