Endpoint Data Protection UkWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Data Protection Uk returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Managed Security Services
 •   Wireless Security
 •   Security Policies
 •   Storage Security

Related Searches
 •   Endpoint Customer
 •   Endpoint Data Protection Presentation
 •   Endpoint Operations
 •   Evaluation Endpoint
 •   Info About Endpoint
 •   Net Endpoint
 •   Prices Endpoint Data
 •   Questions About Endpoint Data Protection
 •   Us Endpoint Data
 •   Whitepaper Endpoint
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Focus on Endpoint Data Protection by Druva Software

March 30, 2011 - (Free Research)
Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript:  Laptop Backup: ESG on the Fastest Growing Challenge for Storage Pros by Copiun

September 01, 2010 - (Free Research)
Check out this presentation transcript featuring Lauren Whitehouse, Senior Analyst, Enterprise Strategy Group as it outlines the challenges associated with endpoint data protection and management, how the problems are being addressed today, the advantages and disadvantages of these different data protection approaches and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Step-by-Step Survival Guide to Data Protection by Druva Software

April 30, 2014 - (Free Research)
This white paper provides step-by-step advice on how organizations can protect their corporate data from threats like lost devices and eDiscovery issues. 
(WHITE PAPER) READ ABSTRACT |

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 06, 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

SecureAnywhere Web Security service by Webroot

May 17, 2013 - (Free Research)
This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users. 
(CASE STUDY) READ ABSTRACT |

E-guide-- Endpoint security suites: What to consider before renewal by ESET

January 13, 2010 - (Free Research)
In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors. 
(EGUIDE) READ ABSTRACT |

Mobile Device Data Protection: Key Findings and Players in the Market by SearchSecurity.com

June 14, 2013 - (Free Research)
This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint. 
(EGUIDE) READ ABSTRACT |

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life by McAfee, Inc.

May 30, 2013 - (Free Research)
This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Endpoint Data Loss Prevention by Symantec Corporation

September 2008 - (Free Research)
Find out the best practices for planning for and deploying an endpoint DLP tool in your corporation. The technology overview section of this document provides a closer look on how DLP works with other existing technologies and how best to integrate DLP in your environment. 
(WHITE PAPER) READ ABSTRACT |

Antivirus Protection for Virtual Desktops by Dell, Inc. and Intel®

December 2011 - (Free Research)
With more and more organizations implementing VDI, enterprises have to find new ways of addressing current security challenges. Discover how to secure your VDI implementation and endpoints in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Laptop Backup FAQ by Druva Software

October 2010 - (Free Research)
This Presentation Transcript sponsored by Druva Inc., focuses on a conversation between Lauren Whitehouse, Senior Analyst with Enterprise Strategy Group, and Andrew Burton, editor of SearchDataBackup.com. Their discussion revolves around backing up important data on your laptop and the best ways to go about doing this. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

EnCase® Cybersecurity by Guidance Software, Inc.

February 2010 - (Free Research)
In this presentation, you’ll learn how EnCase® Cybersecurity helps safeguard your business by providing enterprise wide visibility and endpoint data. 
(PRODUCT OVERVIEW) READ ABSTRACT |

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy by CommVault Systems, Inc.

April 2014 - (Free Research)
This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

Information security breaches survey 2012 by ComputerWeekly.com

April 2012 - (Free Research)
Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey. 
(IT BRIEFING) READ ABSTRACT |

IT in Europe: Security in the Cloud by SearchSecurity.com

August 2011 - (Free Research)
Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks. 
(EZINE) READ ABSTRACT |

Tech Tips: VMware Horizon View by VMware, Inc.

July 2013 - (Free Research)
This resource discusses how VMware Horizon View (formerly VMware View) can help IT pros address top mobility pain points. Discover how this tool enables you to easily virtualize end-user desktops so you can cut operational costs, boost security and meet mobile computing demands. 
(WHITE PAPER) READ ABSTRACT |

Four Steps to Cure Your Patch Management Headache by Lumension

January 2011 - (Free Research)
The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Stopping data leakage: Making the most of your security budget by Sophos UK

March 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

Key Steps to Securing Your Organization and Evicting a Hacker by Foundstone, Inc.

May 2008 - (Free Research)
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks. 
(PODCAST) READ ABSTRACT |

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong by SearchSecurity.co.UK

December 2008 - (Free Research)
Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges. 
(EBOOK) READ ABSTRACT |

Computer Weekly - 21 February 2012: Preparing for IPv6 by ComputerWeekly.com

February 2012 - (Free Research)
This week's digital magazine examines the challenges of migrating to IPv6 now the internet has run out of IPv4 addresses - a process every IT manager now faces. We also look into the IT issues facing smart meters and ask what will the beta launch of Gov.uk hold in store for public services? 
(EZINE) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts