Endpoint Security Research
-
Advanced Persistent Threat Detection: Can It Find Custom Malware?
Sponsored by: UnitedLexA recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.
-
How Global Threat Intelligence Fits into a Security Strategy
Sponsored by: UnitedLexWhile global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.
-
The top threat intelligence services for enterprises
Sponsored by: UnitedLexIf threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
Virtual Desktop Security: Exploring VDI Features
Sponsored by: Dell, Inc. and Intel®This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
-
Endpoint Threat Detection Gets More Response
Sponsored by: Solarwinds MSPThis white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
-
What to Look for in Vulnerability Management
Sponsored by: TechTarget SecurityThis Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
-
Endpoint Security Management: Beyond Antivirus
Sponsored by: TechTarget SecurityAccess this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
-
Can New Security Tools Keep Your Network Clean?
Sponsored by: TechTarget SecurityModern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
-
Fighting Cybercrime in the 21st Century
Sponsored by: TechTarget SecurityStrengthen your security with these expert insights into fighting advanced crimeware.
-
Computer Weekly UK Election Special: Who Wins the Digital Vote?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK goes to the polls, we take an in-depth look at the political parties' manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer's guide covers collaboration software. And we analyse an emerging standard for endpoint security. Read the issue now.
-
Desktop management tools still an IT staple
Sponsored by: TechTarget Enterprise DesktopDespite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.
-
Sysinternals Still Essential for Desktop Troubleshooting
Sponsored by: TechTarget Enterprise DesktopThe Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
-
Mobility Management Evolves Into BYOD and Beyond
Sponsored by: TechTarget Enterprise DesktopEnterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
-
Avoiding Pitfalls on the Path to Endpoint Security
Sponsored by: DellLearn how to craft a sound enterprise desktop security strategy with the tips in this expert ezine from TechTarget.
-
Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
Sponsored by: VMwareThis white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Data Loss Prevention: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Security for a Faster World
Sponsored by: Hewlett Packard EnterpriseThis eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Securing the Internet of Things
Sponsored by: TechTarget SecurityDiscover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.
-
Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
-
Computer Weekly: Going mobile in financial services
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
-
Conquer the Endpoint Backup Challenge
Sponsored by: TechTarget Data BackupThis handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.