ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security White Papers

  • CW ANZ, July 2020: Expert Advice on Security

    Sponsored by: ComputerWeekly.com

    In this handbook, Computer Weekly looks at how organisations in Australia and New Zealand can better protect themselves against evolving cyber threats.

  • SMB Cybersecurity: The Need for Better Protection

    Sponsored by: Kaspersky Lab

    Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.

  • MSPs: The 5 Essentials from Your Endpoint Security Partner

    Sponsored by: Malwarebytes

    When it comes to managing cybersecurity, safeguarding client endpoints is a critical piece of the MSP service offering—as well as a complicated one. Read this e-book to view 5 essentials that MSPs need from their endpoint security providers and for tips and solutions to ensure your MSP is successful in this area.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky Lab

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • MSP best practices for securing servers

    Sponsored by: Malwarebytes

    Servers are the backbone of any managed service provider (MSP) making them a major target for spyware and ransomware. Access this data sheet to learn 4 best practices for securing your servers to ensure your organizations critical information is safe from online attackers.

  • Royal Holloway: An enhanced approach for USB security management

    Sponsored by: ComputerWeekly.com

    USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.

  • Cloud Security: The Optimal Response to Multi-Site Challenges

    Sponsored by: Kaspersky Lab

    In this case study, follow AMISEP, a community development association, as they partner with Kaspersky to implement Endpoint Security Cloud in order to unify, monitor and protect their growing number of distributed endpoints.

  • Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures

    Sponsored by: Thales

    Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.

  • The State of Zero Trust Security in Global Organisations

    Sponsored by: Okta

    If your organisation is looking to implement a zero-trust security model to one or more parts of your network, then this Okta report is a must-read.Zero trust is beginning to take shape across the globe, and this report reveals details as to where it is being implemented, the industries that are implementing it, and how to build a zero-trust stack.

  • Dexar Group Takes on Cybersecurity

    Sponsored by: BlackBerry

    In this case study, follow the Dexar Group, a real estate and property management organization, as they partner with ForwardIT to deploy CylancePROTECT and reduce the time and effort needed to managed their nearly 450 endpoints, addressing the security needs of their remote employees and BYOD devices.

  • Nefilim Ransomware and Mitigating Attacks in the COVID-19 Era

    Sponsored by: BlackBerry

    In Australia, organizations across every sector have been on the receiving end of increasingly frequent and complex malware and ransomware attacks. This article highlights one of the most prominent ransomware attacks, discusses cybersecurity in the COVID-19 era, and more. Read on to get started.

  • B&R Enclosures Takes on Cybersecurity

    Sponsored by: BlackBerry

    In this case study, follow B&R Enclosures, leading specialist in the design and manufacture of industrial equipment in the ‘Australasia’ region, as they incorporate CylancePROTECT in the wake of 2 ransomware attacks in order to leverage the power of AI to detect and prevent future malware and ransomware campaigns.

  • The Australian Museum Takes on Cybersecurity

    Sponsored by: BlackBerry

    In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.

  • Property Brokers Take on Cybersecurity

    Sponsored by: BlackBerry

    In this case study, learn how Property Brokers, New Zealand’s largest provincial real estate organization was able to secure their company-owned endpoints using CylancePROTECT.

  • Transforming Detection and Response: A SANS Review of Cortex XDR

    Sponsored by: Palo Alto Networks

    Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.

  • Cortex XDR Endpoint Protection Solution Guide

    Sponsored by: Palo Alto Networks

    To protect your endpoints against the threats used by today’s cyberattackers, prevention tactics and AI-based analysis tools are needed to simplify operations and outpace hackers. Download this solution guide for a closer look at Cortex EDR, a cloud-delivered agent designed to help with endpoint detection, protection and response.

  • 2020: The State of Endpoint Resilience Report

    Sponsored by: Absolute Software Corporation

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

  • Osterman Research: Focusing on the Endpoint as a Key Element of Your Security Infrastructure

    Sponsored by: Trend Micro

    In the past, endpoints sat behind a network perimeter, but the growth of remote access to corporate resources makes the endpoint the new perimeter. Phishing, ransomware, malware, and web downloads are all potential threats. Delve into this Osterman Research report to get an in-depth look at these threats and how you can protect against them.

  • Secure Anywhere, Protect Everywhere

    Sponsored by: Cisco Umbrella

    Now more than ever: You need visibility, control and protection across users, files, and the internet. In this e-book, learn how Cisco Umbrella and Cisco AMP for Endpoints provide your first and last lines of defense for today's threats, anywhere users go.

  • 2020 User Risk Report

    Sponsored by: Proofpoint

    Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.

  • 2020 Remote Workforce Cybersecurity Guide

    Sponsored by: Automox

    The sudden and dramatic fashion in which organizations had to enable nearly their entire workforce to operate remotely has brought about a new set of security challenges that need to be addressed. Download this white paper to explore these new threats and discover how to address them without increasing cost or complexity.

  • Guide to AV Replacement

    Sponsored by: Crowdstrike

    As cyberattacks evolve into most sophisticated and directed attacks, traditional detection methods, like antivirus (AV) tools, grow increasingly insufficient. Download this guide to better understand the critical information needed to make an informed decision about replacing your AV or endpoint security tools.

  • Preparing for COVID-19-Related Threats

    Sponsored by: TechTarget

    Phishing scams and ransomware attacks that leverage fears surrounding the coronavirus are at an all-time high. Now more than ever, it's critical to ensure the protection of remote devices, employee email inboxes and other vulnerable endpoints. By completing our brief survey, you'll receive a copy of The Cybersecurity Professional's

  • DaaS Proactive Security Management

    Sponsored by: HP Inc

    Managing the security of each user device is complicated, especially at large organizations with a mix of operating systems and device types. In this blog post, take a closer look at HP’s Proactive Security Management suite, designed to help organizations monitor their endpoints and proactively address and mitigate security issues.

  • Smart Protection Complete

    Sponsored by: Trend Micro

    In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.