ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • What to Look for in Vulnerability Management

    Sponsored by: TechTarget Security

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Can New Security Tools Keep Your Network Clean?

    Sponsored by: TechTarget Security

    Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.

  • Fighting Cybercrime in the 21st Century

    Sponsored by: TechTarget Security

    Strengthen your security with these expert insights into fighting advanced crimeware.

  • Computer Weekly UK Election Special: Who Wins the Digital Vote?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK goes to the polls, we take an in-depth look at the political parties' manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer's guide covers collaboration software. And we analyse an emerging standard for endpoint security. Read the issue now.

  • Desktop management tools still an IT staple

    Sponsored by: TechTarget Enterprise Desktop

    Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.

  • Sysinternals Still Essential for Desktop Troubleshooting

    Sponsored by: TechTarget Enterprise Desktop

    The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.

  • Mobility Management Evolves Into BYOD and Beyond

    Sponsored by: TechTarget Enterprise Desktop

    Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.

  • Avoiding Pitfalls on the Path to Endpoint Security

    Sponsored by: Dell

    Learn how to craft a sound enterprise desktop security strategy with the tips in this expert ezine from TechTarget.

  • Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage

    Sponsored by: VMware

    This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Data Loss Prevention: From Business Problem to Technical Solution

    Sponsored by: TechTarget Security

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Security for a Faster World

    Sponsored by: Hewlett Packard Enterprise

    This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: TechTarget Security

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Securing the Internet of Things

    Sponsored by: TechTarget Security

    Discover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.

  • Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.

  • Computer Weekly: Going mobile in financial services

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • Conquer the Endpoint Backup Challenge

    Sponsored by: TechTarget Data Backup

    This handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.

  • Computer Weekly – 22 July 2014: Time to get serious about endpoint security

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.

  • Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise

    Sponsored by: Sophos

    This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.

  • Avoiding Pitfalls on the Path to Endpoint Security

    Sponsored by: TechTarget Enterprise Desktop

    This handbook reveals how to get ahead of enterprise desktop security threats by detailing why controlling sensitive data should take priority over efforts to chase proliferating mobile devices, why you should include security guarantees in the terms of service-level agreements, and lessons to take away from recent point-of-scale security breaches.

  • Why Endpoint Backup Is More Critical Than Ever

    Sponsored by: Code42

    Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.

  • Strengthen Enterprise Resilience with Automated Endpoint Backup

    Sponsored by: Code42

    Access this white paper to delve into new research that highlights potential problems and gaps in organizations' approaches to endpoint backup. Inside, find out why smart IT leaders are looking for automated endpoint backup solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.