endpoint

Results 401 - 425 of 585Sort Results By: Published Date | Title | Company Name
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities, security
    
CarbonBlack
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management, business technology
    
CarbonBlack
Published By: NComputing     Published Date: Oct 16, 2012
Download this white paper to read about how to best break through the long-running price/performance and manageability barriers to deliver a purpose-built endpoint solution for HDX.
Tags : 
enterprise vdi, desktop virtualization, vdi deployment, virtual deployment, system-on-a-chip, enterprise applications, business technology, virtualization
    
NComputing
Published By: Cisco     Published Date: Sep 07, 2016
This white paper explains what's needed for effective malware analysis.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes into detail about continuous endpoint threat detection and response in a point-in-time world.
Tags : 
    
Cisco
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint, device protection, security, wireless
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
endpoint performance, performance testing, security software, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Apr 29, 2015
Learn how to perfect your organization’s endpoint protection and see how to deal with a more mobile workforce and more dangerous malware.
Tags : 
software, workforce, webroot, it suuper, antivirus, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Sep 14, 2015
Webroot SecureAnywhere® Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook.
Tags : 
endpoint protection, security software, user protection, security
    
Webroot Inc
Published By: Polycom     Published Date: Jun 08, 2016
Microsoft Lync and Skype for Business each provides presence information within email and business applications and promotes voice and video collaboration within virtual teams, and with customers and partners. Polycom extends the benefits of Lync’s voice solutions with Polycom voice endpoints and enables collaboration experiences in multiple environments within the Microsoft Lync or Skype for Business interfaces.
Tags : 
business optimization, business strategy, network management, business applications, best practices, cost reduction, best practices
    
Polycom
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : 
aberdeen, free av, endpoint security, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : 
endpoint, security, vendor, iot, it management
    
Intel Security
Published By: Intel Security     Published Date: Feb 16, 2016
Download a free copy ($1,995 value) of Gartner's 2016 Magic Quadrant for Endpoint Protection Platforms compliments of Intel Security. Gartner Magic Quadrants are based on rigorous, fact-based analysis backed up by a highly structured methodology. Read this report and find out why for the 13th consecutive year Gartner has positioned Intel Security as a leader in the Gartner Magic Quadrant for the Endpoint Protection Platforms (EPP) market report.
Tags : 
    
Intel Security
Published By: Polycom     Published Date: Nov 29, 2016
Microsoft Lync and Skype for Business each provides presence information within email and business applications and promotes voice and video collaboration within virtual teams, and with customers and partners. Polycom extends the benefits of Lync’s voice solutions with Polycom voice endpoints and enables collaboration experiences in multiple environments within the Microsoft Lync or Skype for Business interfaces.
Tags : 
    
Polycom
Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout
Published By: Code42     Published Date: Feb 28, 2018
Business Continuity Starts with the Ability to Go Back No matter the size of the business, no matter the industry, the business world moves faster than ever. Constant digital innovation is only accelerating that pace. Yet, to keep business moving forward, ensure uninterrupted productivity and guarantee business continuity, organizations need to first focus on the ability to go back— to undo, restore and recover.
Tags : 
    
Code42
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept