endpoint

Results 251 - 275 of 585Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 31, 2018
Manage identity and access across the full range of on-premises, cloud and mobile applications with IBM Cloud Identity.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 06, 2018
CISOs Investigate is a series that offers first-hand insights to security leaders as they makebusiness-driven risk and technology decisions
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 06, 2018
How BigFix can automate endpoint management to decrease security risk surfaces, manage configurational drift, and maintain compliance.
Tags : 
    
IBM
Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas, mdm, client management
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity, smartphones, tablets
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: Intel     Published Date: Aug 10, 2012
Intelligent Desktop Virtualization (IDV) combines the best end point security with no compromises in user experience, productivity, cost, or flexibility.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter, security, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : 
aberdeen, free av, endpoint security, security, it management
    
Intel Security
Published By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : 
endpoint, security, vendor, iot, it management
    
Intel Security
Published By: Intel Security     Published Date: Feb 16, 2016
Download a free copy ($1,995 value) of Gartner's 2016 Magic Quadrant for Endpoint Protection Platforms compliments of Intel Security. Gartner Magic Quadrants are based on rigorous, fact-based analysis backed up by a highly structured methodology. Read this report and find out why for the 13th consecutive year Gartner has positioned Intel Security as a leader in the Gartner Magic Quadrant for the Endpoint Protection Platforms (EPP) market report.
Tags : 
    
Intel Security
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace, security, data quality
    
KACE
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
    
Kaseya
Published By: Kaseya     Published Date: Mar 12, 2015
Fighting Cyber Crime with Automated, Centralized Management
Tags : 
cyber crime, automation management systems, network security, software applications, network infrastructure
    
Kaseya
Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
Kaseya
Published By: Kaspersky     Published Date: Oct 26, 2016
Download Kaspersky Lab’s Security in the Cloud Snapshot* to learn about the most pressing cloud security issues and how you can address them.
Tags : 
kaspersky, cloud security, critical operations, endpoint security, cloud computing
    
Kaspersky
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept