Endpoint Security Research
-
File Sync and Share: Risks, Rewards, Considerations, and Deployment Options
Sponsored by: Dropbox for BusinessThis e-guide discusses the risks, rewards and deployment options for enterprise file sync-and-share and reveals key security considerations and product features to pay attention to. Read on to learn more.
-
How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
Sponsored by: Bit9, Inc.Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
-
Mobility Mayhem: Balancing BYOD with Enterprise Security
Sponsored by: Code42Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.
-
How to take Advantage of Security Ops that go Beyond the OS
Sponsored by: Intel and McAfeeIn this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
-
Symantec Intelligence Report - August 2013
Sponsored by: Symantec CorporationIn this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
-
Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud
Sponsored by: TechTarget SecurityIn this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy.
-
Endpoint Security: Anti-Virus Alone is Not Enough
Sponsored by: LumensionAccess this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
-
Weaponized malware now threatens the private sector
Sponsored by: LumensionAccess this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
Sponsored by: OpenText Security SolutionsThis expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
TechGuide: Endpoint Security Management
Sponsored by: TechTarget SecurityThis expert e-guide will help you sort through your endpoint security management troubles by redefining and transitioning your strategy to fit the growing requirement for defending against malware.
-
Determining the Most Effective Endpont Management
Sponsored by: IBMThis white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
-
3 Cloud Backup Services Ease Protection of Laptops
Sponsored by: Code42This e-guide examines three types of cloud backup services and the key factors you need to consider when evaluating them.
-
September Information Security Magazine
Sponsored by: TechTarget SecurityIndustry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
-
Crucial Enterprise Endpoint Backup Requirements
Sponsored by: Code42This crucial paper provides a helpful checklist of the requirements an enterprise endpoint backup strategy needs to satisfy in order to properly and successfully protect the data stored on your endpoints.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Backing up Buckeyes: Enterprise endpoint backup in an evolving-BYOD, customer-centric IT culture
Sponsored by: Code42This exclusive case study examines how a major American university utilized an endpoint backup solution in combination with a private cloud strategy to streamline backup management, support all mobile platforms and lower overall costs.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionProtecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
-
How to Achieve Device Control Peace of Mind
Sponsored by: LumensionUncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
-
PassMark Report: Enterprise Endpoint Security Performance Benchmarks
Sponsored by: Symantec CorporationThis PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
-
Handbook: Identity and Access Management
Sponsored by: TechTarget SecurityIn this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Cloud App Success Means End-User Identity Management
Sponsored by: VMware, Inc.This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps.