ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Expanding Machine Learning Applications on the Endpoint

    Sponsored by: Blackberry Cylance

    Endpoint detection and response (EDR) has emerged as a key component of an endpoint security strategy. But according to recent research, customers believe there is still opportunity for improvements in EDR. Download this report to learn about the current EDR approaches taken and how machine learning can benefit EDR.

  • Sydney Opera House Case Study

    Sponsored by: Blackberry Cylance

    The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.

  • The Future of Cybercrime and Security

    Sponsored by: Webroot

    In Juniper Research's The Future of Cybercrime & Security report, explore key takeaways and an overview of the network & endpoint cybersecurity competitive landscape.

  • Business Endpoint Protection

    Sponsored by: Webroot

    Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.

  • A Quick Guide to Stopping Ransomware

    Sponsored by: Webroot

    In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.

  • 4 Steps to Help You Practice for the CISSP exam

    Sponsored by: TechTarget

    Are you ready for the CISSP exam? Your free CISSP prep guide awaits. Add your unique insights to our market research program to access your free PDF download and become one step closer to earning your certification!

  • How to Lock Down Mobile Devices, Printers, and Laptops from Costly Cyberattacks

    Sponsored by: TechTarget

    Are we just supposed to shrug our shoulders and pretend we can't combat the proliferation of endpoints with smarter security tactics? Not a chance. Complete our endpoint security survey for access to our e-guide, which comes packed with powerful tips and tactics to lock down mobile devices, printers, and laptops from costly cyberattacks.

  • Explore the ROI of CylancePROTECT and CylanceOPTICS

    Sponsored by: Blackberry Cylance

    To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.

  • APAC guide to plugging endpoint security gaps

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the evolution of endpoint security, how APAC organisations are using artificial intelligence to plug endpoint security gaps as well as potential blindspots in encrypted traffic used by a growing plethora of endpoint devices.

  • Why EDR Technologies are Essential for Endpoint Protection

    Sponsored by: SearchSecurity.com

    While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Sponsored by: ComputerWeekly.com

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • The Zenefits Bug Bounty Story

    Sponsored by: HackerOne

    Zenefits, the All-in-One HR Platform, holds sensitive financial data for over 10,000 small and medium businesses. In order to protect this high risk data, Zenefits has partnered with HackerOne to implement a successful bug bounty program. In this case study, explore 4 tips for a successful private bounty program.

  • Five Ways to Rethink Your Endpoint Protection Strategy

    Sponsored by: McAfee, Inc.

    Device security is no longer about traditional antivirus versus next-generation endpoint protection. The truth is you need a layered and integrated defense that protects your entire digital terrain and all types of devices—traditional and nontraditional. In this white paper, discover 5 ways to rethink your endpoint protection strategy today.

  • Protect Critical Infrastructures from Nation-State Attacks

    Sponsored by: enSilo

    Nation states funding allows cybercriminals to develop APT groups targeting discontinued, unsupported and outdated control systems, lacking relevant security measures. This is a combination for worldly disaster. In this resource, explore 5 ways your organization can defeat state sponsored attacks.

  • Containing Security Incident Response Costs

    Sponsored by: enSilo

    Of the many challenges security leaders face, one big issue that can often be downplayed is budgeting. While the cost of a breach is well documented, the costs of managing a security team, that can prevent attacks, are not. In this white paper, learn how enSilo can help solve the problem of uncontained and unexpected incident response costs.

  • Real-Time Automated Endpoint Security

    Sponsored by: enSilo

    enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.

  • How to Survive Advanced Targeted Attacks

    Sponsored by: enSilo

    Beverage companies' data is constantly on the radar of competitors and threat actors looking to steal or maliciously modify ingredients in data breaches. In this case study, learn how one beverage company was able to discover over 300 potential threats and unauthorized programs running on their endpoint by installing enSilo.

  • Instant Security Maturity Assessment

    Sponsored by: CrowdStrike

    In this resource, learn about CrowdStrike's Falcon Complete which fuses machine intelligence with human intervention to prevent breaches. Falcon Complete operationalizes your organization against malware, ransomware and fileless attacks. Download the resource to explore the benefits.

  • Stripping The Malware Threat Out Of Powershell With Ensilo

    Sponsored by: enSilo

    While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.

  • A Holistic Approach To Identity And Authentication

    Sponsored by: HID Global

    As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.

  • Endpoint Protection Buyers Guide

    Sponsored by: CrowdStrike

    Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.

  • Where to Invest Next to Mature Cybersecurity

    Sponsored by: CrowdStrike

    To help your organization answer questions like, "Where should we invest next?" this white paper identifies the critical decision points that companies arrive at as they mature their cybersecurity strategy – related to people, processes, and technologies – and provides guidance to face the challenges these decisions present.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • Endpoint Security: from A to (N)Z

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how ANZ enterprises are approaching endpoint security and the tools you can add to your endpoint security arsenal.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.