ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Research

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

  • The top threat intelligence services for enterprises

    Sponsored by: UnitedLex

    If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • What to Look for in Vulnerability Management

    Sponsored by: TechTarget Security

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Can New Security Tools Keep Your Network Clean?

    Sponsored by: TechTarget Security

    Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.

  • Fighting Cybercrime in the 21st Century

    Sponsored by: TechTarget Security

    Strengthen your security with these expert insights into fighting advanced crimeware.

  • Computer Weekly UK Election Special: Who Wins the Digital Vote?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK goes to the polls, we take an in-depth look at the political parties' manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer's guide covers collaboration software. And we analyse an emerging standard for endpoint security. Read the issue now.

  • Desktop management tools still an IT staple

    Sponsored by: TechTarget Enterprise Desktop

    Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.

  • Sysinternals Still Essential for Desktop Troubleshooting

    Sponsored by: TechTarget Enterprise Desktop

    The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.

  • Mobility Management Evolves Into BYOD and Beyond

    Sponsored by: TechTarget Enterprise Desktop

    Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.

  • Avoiding Pitfalls on the Path to Endpoint Security

    Sponsored by: Dell

    Learn how to craft a sound enterprise desktop security strategy with the tips in this expert ezine from TechTarget.

  • Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage

    Sponsored by: VMware

    This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Data Loss Prevention: From Business Problem to Technical Solution

    Sponsored by: TechTarget Security

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Security for a Faster World

    Sponsored by: Hewlett Packard Enterprise

    This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: TechTarget Security

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Securing the Internet of Things

    Sponsored by: TechTarget Security

    Discover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.

  • Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.

  • Computer Weekly: Going mobile in financial services

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • Conquer the Endpoint Backup Challenge

    Sponsored by: TechTarget Data Backup

    This handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.