ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security White Papers

  • Analyse des Reifegrades des Identity- und Access-Managements in weltweit tätigen Unternehmen

    Sponsored by: Okta

    Noch vor gerade einmal vier Jahren hatten laut Umfragen 16 % der Unternehmen eine Zero-Trust-Initiative aktiv. Diese Zahl hat einen sagenhaften Ansprung auf ganze 97 % erlebt. Hier erfahren Sie mehr.

  • 7 best practices for Web3 security risk mitigation

    Sponsored by: ComputerWeekly.com

    Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.

  • 5 endpoint security best practices

    Sponsored by: ComputerWeekly.com

    With an endpoint security policy in place, organizations can ensure corporate assets and data remain protected even when devices outside of their four walls access them. To get started writing a policy customized for your company, here are five universal endpoint security best practices to consider.

  • 2022 Competitive Strategy Leader

    Sponsored by: Xcitium

    Endpoint security tools are in high demand due to the increasing complexity and occurrences of ransomware, malware, and other cyberthreats. Access this Frost & Sullivan report to learn about the key features of Comodo’s Xcitium and discover why it earned recognition for its endpoint security capabilities.

  • Infographic: Vulnerability management vs. Patch management

    Sponsored by: ComputerWeekly.com

    Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.

  • 12 essential features of advanced endpoint security tools

    Sponsored by: ComputerWeekly.com

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.

  • 2 types of endpoint encryption to protect data

    Sponsored by: ComputerWeekly.com

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

  • CW APAC, April 2022: Trend Watch: Cyber security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how to minimise edge security risks, India's rise in cyber security revenues and Trellix's decision to democratise XDR access

  • The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020 *

    Sponsored by: Bitdefender

    Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.

  • Industrial Giant Discovers 200,000 Network Endpoints in One Day

    Sponsored by: Beta Systems

    One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.

  • Network Security Management For IT and industrial Networks

    Sponsored by: Beta Systems

    Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.

  • Business Infrastructure Control System – BICS

    Sponsored by: Beta Systems

    Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.

  • Visibility Gap Study

    Sponsored by: Tanium

    This study, conducted by independent market-research specialist Vanson Bourne, dives into the 5 key challenges caused by visibility gaps and what enterprise IT teams can do to address them before it's too late. Read on to learn more.

  • How a Wine and Spirits Distributor Protects its Data and Reputation with Threat Hunting

    Sponsored by: Cisco Secure

    Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.

  • Marine Credit Union Bolsters Their Security with Cisco

    Sponsored by: Cisco Secure

    Marine Credit Union had a tough mission in front of them: Build top-notch security on a budget. They had to defend their highly targeted data against online criminals and nation states with the goal of safeguarding their members’ financial information. View this case study to discover how Cisco helped Marine Credit Union achieve their goal.

  • The Need for Speed: Second Generation EDR

    Sponsored by: Fortinet, Inc.

    Even with the use of advanced machine learning and behavioral analytics, endpoint security solutions still can’t prevent 100% of threats. And while endpoint detection and response (EDR) has improved dramatically since its release, there are still gaps left to fill. Take a look at this ESG white paper to learn about second generation EDR.

  • Case Study: Archdiocese

    Sponsored by: Bitdefender

    The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.

  • What Is The Next Step For Next-Gen Antivirus?

    Sponsored by: Palo Alto Networks

    Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • Future-Proofing Enterprise Security Awareness in the Age of Workforce Mobility

    Sponsored by: Barracuda

    With enterprises gearing towards a more mobile workforce, security awareness is now more important than ever – and the trends behind it are crucial for IT professionals. To get a sense of the readiness of organizations in employee awareness and training, read this Forrester report to explore these trends, as well as priorities, in this space.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    Sponsored by: Barracuda

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • Quocirca: Selecting a cloud printing platform

    Sponsored by: ComputerWeekly.com

    As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.

  • 12 Essential Features of Advanced Endpoint Security Tools

    Sponsored by: Claranet

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.

  • Why You Should Consider Endpoint Detection & Response

    Sponsored by: Claranet

    Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.