End Point Security Reports

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 08 Feb 2021 | Published: 17 Jun 2019

TechTarget ComputerWeekly.com

Conquer the Endpoint Backup Challenge
sponsored by TechTarget Data Backup
EBOOK: This handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

TechTarget Data Backup

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by TechTarget Security
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TechTarget Security

Mobility Management Evolves Into BYOD and Beyond
sponsored by TechTarget Enterprise Desktop
EBOOK: Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

TechTarget Enterprise Desktop

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by TechTarget Enterprise Desktop
EBOOK: This handbook reveals how to get ahead of enterprise desktop security threats by detailing why controlling sensitive data should take priority over efforts to chase proliferating mobile devices, why you should include security guarantees in the terms of service-level agreements, and lessons to take away from recent point-of-scale security breaches.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

TechTarget Enterprise Desktop

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by TechTarget Security
EZINE: As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

TechTarget Security

The top threat intelligence services for enterprises
sponsored by UnitedLex
EGUIDE: If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Why Endpoint Backup Is More Critical Than Ever
sponsored by Code42
WHITE PAPER: Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.
Posted: 12 Jun 2014 | Published: 30 Apr 2014

Code42

Explore the latest enterprise mobile security technology
sponsored by TechTarget Mobile Computing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

TechTarget Mobile Computing