Endpoint Security Research
-
CentraStage Endpoint Management
Sponsored by: CentraStageThis brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
-
EMA Report: The Benefits of a Unified Endpoint Management Approach
Sponsored by: IBMRead this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
-
Insider Edition: Antimalware Technologies and Techniques to the Rescue
Sponsored by: TechTarget SecurityIn this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
-
The Definitive Guide to the Next Generation of Threat Protection
Sponsored by: FireEyeThis in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
-
Symantec Intelligence Report - January 2014
Sponsored by: Symantec CorporationThis in-depth analysis explores the current threat landscape, the most common security threats, and how you can prevent them.
-
Supply Chain Analysis: From Quartermaster to Sunshop
Sponsored by: FireEyeThis in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
-
Securing your Midsized Business
Sponsored by: IBMThis guide explores security management strategies and how to combat the growth of sophisticated threats.
-
Security Trends 2014
Sponsored by: Global KnowledgeIn this resource, find out what you need to know about security trends in 2014.
-
Security Trends 2014
Sponsored by: Global KnowledgeIn this resource, find out what you need to know about security trends in 2014.
-
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Sponsored by: LumensionThis informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
-
Keeping Distributed Endpoints Safe and Secure
Sponsored by: IBMIn this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
-
Application Whitelisting Best Practices: Lessons from the Field
Sponsored by: LumensionThis in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
-
BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
Sponsored by: Accellion, Inc.Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
-
Select the Right Solution for Endpoint Management
Sponsored by: IBMThis guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
-
Computer Weekly – December 17 Edition
Sponsored by: TechTarget ComputerWeekly.comCan BlackBerry restore its business appeal? In this week's issue of Computer Weekly, we investigate whether former Sybase chief, John Chen, will be able to stem the decline of the smartphone maker and reinvent the company as a software business for the era of BYOD.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
Endpoint Security IT Decision Center Handbook 3
Sponsored by: TechTarget SecurityAccess this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
-
Endpoint Security Best Practices
Sponsored by: Symantec CorporationIn this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
-
Endpoint Security IT Decision Center Handbook 2
Sponsored by: TechTarget SecurityAccess this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
Emerging Security Trends and Risks: Insights for the Business Executive
Sponsored by: IBMThis report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
-
File Sync and Share: Recent Developments and Points to Address in your Usage Policy
Sponsored by: Dropbox for BusinessThis e-guide recounts the latest advances in enterprise collaboration technology and explains why security remains a top priority for the companies that leverage it. Read on to learn more.
-
Mobility is here to stay – Is your data is backed up?
Sponsored by: TechTarget Data BackupRemote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
-
Why the Endpoint Must be the New Security Focus
Sponsored by: Bit9, Inc.Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.
-
Endpoint Security Technology
Sponsored by: Symantec CorporationAccess this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
-
A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMAccess this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.