Endpoint ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Review returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Application Security
 •   Wireless Technologies and Mobile Computing
 •   Virtualization
 •   Desktop Management
 •   Mobile Device Management
 •   Wireless Security
 •   Security Monitoring

Related Searches
 •   Endpoint Codes
 •   Endpoint Review Analysis
 •   Endpoint Review Capture
 •   Endpoint Review Display
 •   Endpoint Review Functions
 •   Endpoint Review Related
 •   Endpoint Review Version
 •   Net Based Endpoint Review
 •   Pay Endpoint Review
 •   Technologies Endpoint Review
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

E-guide-- Endpoint security suites: What to consider before renewal by ESET

January 13, 2010 - (Free Research)
In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors. 
(EGUIDE) READ ABSTRACT |

Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments by Trend Micro, Inc.

October 20, 2010 - (Free Research)
This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool by EMC Corporation

December 31, 2013 - (Free Research)
Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Solving the Password Management Paradox: Defining the Problem and Reviewing the Four Best-Known Solutions by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This paper discusses the paradox of strong password policies, evaluates several possible solutions, and recommends a password management solution that is cost effective and easy to implement. 
(WHITE PAPER) READ ABSTRACT |

Fact or Fiction Security Survival Guide by Lumension

February 2009 - (Free Research)
This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors. 
(WHITE PAPER) READ ABSTRACT |

Windows Server 2012 Security from End to Edge and Beyond by ComputerWeekly.com

September 2013 - (Free Research)
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. 
(BOOK) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Brian Madden on Desktop Virtualization User Trends in 2013 by TechTarget

February 2014 - (Free Research)
If virtual desktops don't increase the overall security of your environment and moving a desktop to the data center is hard, then why is it positioned as a remedy for many of todays' endpoint issues? Complete this short survey to receive exclusive access to Brain Madden's analysis and observations of current end user trends in desktop delivery. 
(RESOURCE)

CWAT Data Loss Prevention - Whitepaper/Technical Review by Software Engineering of America, Inc.

February 2008 - (Free Research)
CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks. 
(WHITE PAPER) READ ABSTRACT |

Considering a BYOPC Strategy: A Q&A by LogMeIn, Inc.

February 2012 - (Free Research)
Discover the concerns, opportunities, and benefits of enabling a BYOPC initiative in your workplace, including why enforcing a strict policy beforehand is essential to its success. 
(EGUIDE) READ ABSTRACT |

Top Reasons to Adopt Desktop Virtualization by Dell, Inc. and Intel®

July 2010 - (Free Research)
In this presentation transcript, the speaker discusses the three key messages that IT leaders should include in their business case for desktop virtualization: increased security, manageability and flexibility for the end user. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 2012 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization by Citrix

December 2010 - (Free Research)
Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI. 
(WHITE PAPER) READ ABSTRACT |

WebSense Security Lab: Zero-Day in Critical Vulnerability by Websense, Inc.

September 2009 - (Free Research)
The Websense Security Labs Team provides a review of recent threats in this presentation transcript. Learn more about techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

When Malware Goes Mobile: Causes, Outcomes and Cures by Sophos, Inc.

May 2013 - (Free Research)
This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more. 
(WHITE PAPER) READ ABSTRACT |

EFG Bank Case Study by ArcSight, an HP Company

November 2009 - (Free Research)
ArcSight Logger 4 provides EFG Bank a platform that allows their auditors to easily search and review logs to prove adherence to strict compliance and regulation laws. 
(CASE STUDY) READ ABSTRACT |

10 VDI Benefits You Can Achieve Without VDI by Dell, Inc. and Intel®

December 2011 - (Free Research)
Discover how you can achieve VDI levels of manageability with traditional PCs in this resource. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Migration and Security in SOA by Torry Harris Business Solutions

March 2009 - (Free Research)
It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for July-December 07 by Symantec Corporation

June 2008 - (Free Research)
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007. 
(WHITE PAPER) READ ABSTRACT |

Eight Steps to Better Securing Exchange Server 2010 by Symantec Corporation

December 2012 - (Free Research)
Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010. 
(EGUIDE) READ ABSTRACT |

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust by VeriSign Australia

August 2010 - (Free Research)
This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line. 
(WHITE PAPER) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

The Review Center Playbook: A how-to guide to using the Review Center within Contour by Jama Software

September 2010 - (Free Research)
Review Center is a module within Contour that provides a fast and agile way to collaborate on requirements. It enables teams to discuss, review and approve requirements with stakeholders and customers in real-time. It can also cut requirements approval cycles from weeks to days. This playbook provides a step-by-step guide on how to use it. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts