ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Endpoint Detection and Response

    Sponsored by: CrowdStrike

    This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.

  • Endpoint Protection Platforms

    Sponsored by: CrowdStrike

    An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file based malware, to detect and block malicious activity, and to provide capabilities needed to respond to security incidents. This Gartner Peer Insights report provides peer reviews and ratings of EPPs. Download the report to explore the EPP market.

  • Critical Capabilities for Endpoint Protection Platforms

    Sponsored by: CrowdStrike

    Endpoint protection is evolving to address security architecture tasks such as hardening, investigation, incident detection and incident response. In this Gartner analysis report, discover critical capabilities of Endpoint Protection Platform vendors and how their products stack up.

  • Falcon Complete - Instant Cybersecurity Maturity White Paper

    Sponsored by: CrowdStrike

    The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.

  • Getting a handle on endpoint management

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the need for unified endpoint management, what an endpoint management strategy should cover and how endpoint security issues can be tackled.

  • Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology

    Sponsored by: Fidelis

    Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.

  • Employee Habits that Can Put Your Company at Risk

    Sponsored by: Panda Security

    While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.

  • Why the Citrix-Microsoft Relationship Will Enhance Digital Workspace Solutions for Customers

    Sponsored by: Citrix

    Download this resource to learn how a Citrix-Microsoft partnership can provide the capabilities your IT team needs to deploy digital workspaces more quickly, effectively and securely.

  • What's Next in Digital Workspaces: 3 Improvements to Look for in 2019

    Sponsored by: Citrix

    Download this article to uncover three new capabilities or features that will make digital workspaces even more compelling and less complex to deploy and manage in the coming year.

  • End-User Service Delivery: Why IT Must Move Up the Stack to Deliver Real Value

    Sponsored by: Citrix

    Download this resource to learn how unified digital workspaces, with built in automation capabilities, can eliminate low-value, resource-intensive tasks. You'll see how moving the focus to the top of the stack allows IT to better understand the services and apps that will make a difference in supporting digital transformation.

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

  • 11 Limitations of Network-Centric Security In The Cloud

    Sponsored by: Lacework

    Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.

  • Securing the Cloud Adoption Journey

    Sponsored by: BT

    The adoption of hybrid and cloud networks brings about new security risks. If security is to be maintained within these environments, a list of obstacles must be overcome. Download this resource to discover the 5 core obstacles that often prevent businesses from securing their cloud environments.

  • Endpoint Detection & Response Is Not Enough

    Sponsored by: Arctic Wolf

    Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    Sponsored by: ComputerWeekly.com

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

  • Latest Cyber Security Strategies in ASEAN

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.

  • Controlling the Uncontrollable End User

    Sponsored by: Citrix

    Read this article to learn how secure digital workspaces can provide platforms that position your organization to give users the experience and options they demand, while providing unified security and management functionality for IT.

  • The Essential Guide to Security

    Sponsored by: Splunk

    With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.

  • Understanding Cyberattacks

    Sponsored by: Panda Security

    It is critical to understand the cyber-kill chain for identifying threats throughout the different stages of an attack lifecycle. There are 7 basic steps to the cyber-kill chain. Download this white paper to discover details on all of them to halt cyberattacks in their tracks.

  • Prevent Laptop Security Breaches —No Active Directory Required

    Sponsored by: OneLogin

    Users accessing corporate data, apps, devices, on laptops or off-premise, is at an all-time high and businesses must increase their security. Explore ways your organization can shrink its security gaps and risks with Single-Sign On (SSO).

  • Definitive Guide to SOC-as-a-Service

    Sponsored by: Arctic Wolf

    Explore this e-book for insights on cyberattacks and threats, security operation centers as-a-service, and much more.

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • Crafting a Secure Endpoint Management Strategy

    Sponsored by: Vox Mobile Solutions

    Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.

  • Desktop & Endpoint Management: Tools and Best Practices

    Sponsored by: Dell Technologies

    Download this E-guide to learn how unified endpoint management (UEM) and other tools and best practices can ease desktop management for IT.

  • Evaluate Desktop Management Tools

    Sponsored by: Dell Technologies

    Download this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.