endpoint

Results 51 - 75 of 597Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: Cylance     Published Date: Sep 13, 2017
Streamline your endpoint security stack and your team's workload with predictive, AI based, pre-execution malware protection plus prevention based EDR. CylancePROTECT combined with CylanceOPTICS = real-time, predictive threat prevention.
Tags : 
    
Cylance
Published By: TrendMicro     Published Date: May 09, 2011
This paper details the results of a benchmark test conducted between Trend Micro Deep Security, McAfee Total Protection for Endpoint and Symantec Endpoint Protection 11.0 in virtual environments.
Tags : 
trendmicro, anti-virus performance, vmware esx, virtual environments, mcafee total protection, symantec endpoint protection
    
TrendMicro
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management, enterprise applications
    
Arcserve
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: Datastax     Published Date: Aug 23, 2017
The world today is interacting at every level - consumers, business customers and employees - through cloud applications, and these cloud applications are transforming customer experiences. So what is a cloud application? Any application that has many geographically distributed endpoints (e.g. browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
datastax, technology, customer experience, cloud
    
Datastax
Published By: Datastax     Published Date: May 15, 2018
So what is a cloud application? Any application that has many geographically distributed endpoints (e.g., browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
    
Datastax
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
av-test, deep defender, rootkits, detection
    
McAfee
Published By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
mcafee, av-test, deep defender, rootkits, detection
    
McAfee
Published By: Cylance     Published Date: Sep 13, 2017
AV-TEST performed an advanced threat prevention test of enterprise endpoint protection software to evaluate and compare its ability to detect and prevent new and unknown malicious executables.
Tags : 
    
Cylance
Published By: Cylance     Published Date: Oct 06, 2017
AV-TEST Ranks Cylance as Top Endpoint Security Vendor
Tags : 
    
Cylance
Published By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : 
endpoint protection, security, performance test, comparison
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
    
Kaseya
Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management, knowledge management, enterprise applications
    
Code42
Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes, security, database security
    
IBM
Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis, nevis networks, precision prospects
    
Nevis Networks
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 07, 2016
This white paper explains what's needed for effective malware analysis.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept