Endpoint SearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Search returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Search / Search Engines
 •   Data Security
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   Enterprise Content Management (ECM)
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Business Intelligence Solutions

Related Searches
 •   Computerized Endpoint Search
 •   Designer Endpoint
 •   Endpoint Erp
 •   Endpoint Search Consulting
 •   Endpoint Search Distributions
 •   Endpoint Virginia
 •   Managers Endpoint Search
 •   Monitoring Endpoint Search
 •   Parts Endpoint
 •   Templates Endpoint
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 10, 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 30, 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy by CommVault Systems, Inc.

April 28, 2014 - (Free Research)
This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches. 
(WHITE PAPER) READ ABSTRACT |

Select the right solution for endpoint management by IBM

August 24, 2012 - (Free Research)
Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business. 
(WHITE PAPER) READ ABSTRACT |

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension

October 11, 2013 - (Free Research)
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry. 
(WHITE PAPER) READ ABSTRACT |

Intrusion Defense Firewall: Network-Level HIPS at the Endpoint by Trend Micro, Inc.

July 15, 2010 - (Free Research)
This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques. 
(WHITE PAPER) READ ABSTRACT |

EMA Analyst Report on the Mobile Device Management Marketspace by IBM

August 24, 2012 - (Free Research)
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 26, 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

IT Decision Checklist: Remote Access by VirtualArmor

March 19, 2010 - (Free Research)
The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

 Safer web browsing in four steps by Sophos, Inc.

October 04, 2010 - (Free Research)
Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data. 
(WHITE PAPER) READ ABSTRACT |

A Buyer's Guide to Data Loss Protection Solutions by Websense, Inc.

July 14, 2011 - (Free Research)
Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution. 
(WHITE PAPER) READ ABSTRACT |

EFG Bank Case Study by ArcSight, an HP Company

November 02, 2009 - (Free Research)
ArcSight Logger 4 provides EFG Bank a platform that allows their auditors to easily search and review logs to prove adherence to strict compliance and regulation laws. 
(CASE STUDY) READ ABSTRACT |

IBM's Approach to Advanced Persistent Threats by IBM

August 02, 2012 - (Free Research)
Access this video to learn more about advanced persistent threats (APTs) and how to address them. Topics covered the nature of APTs, preventative measures to take, and how professionals are addressing this challenge. 
(VIDEO) READ ABSTRACT |

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 09, 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

The Next Generation of Cybercrime: How it's evolved, where it's going by Dell, Inc.

May 19, 2011 - (Free Research)
Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks. 
(WHITE PAPER) READ ABSTRACT |

Acumin Contract Rate Index August 2012 by ComputerWeekly.com

September 27, 2012 - (Free Research)
Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Understanding Big Data and Security by Hewlett-Packard Limited

April 16, 2013 - (Free Research)
This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility. 
(WEBCAST) READ ABSTRACT |

What's New in Enterprise Search in SharePoint 2010 by Microsoft Corporation India Pvt Ltd

November 12, 2009 - (Free Research)
Microsoft SharePoint Server 2010 offers all of the enterprise search features and functionality that are in Microsoft Office SharePoint Server 2007 and provides many new enterprise search capabilities. This article summarizes the new enterprise search features and functionality in SharePoint Server 2010. 
(WHITE PAPER) READ ABSTRACT |

Overview of Windows Search Technologies by Global Knowledge

February 10, 2009 - (Free Research)
This paper helps us to understand the importance of desktop search tools fit in the universe of Microsoft search tools. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-Zine Volume 9: Rediscovery, Research and Prediction in SharePoint Search by SearchWinIT

April 15, 2009 - (Free Research)
In this month's issue of SharePoint eZine, you'll learn how indexing content creates a search environment that gives users information as they need it, how to maintain your SharePoint governance documents while keeping them current, and how setting guidelines for site provisioning gives flexibility for users and helps manage growth. 
(EZINE)

Learn More About KnowledgeStorm by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
KnowledgeStorm is the Internet's top-ranked search resource for technology solutions and information. With our premier network, search expertise and performance tools and services, KnowledgeStorm provides technology vendors the most opportunities to reach buyers on the Internet and convert them into Web leads. 
(WHITE PAPER) READ ABSTRACT |

Discover the Unique Benefits of Enterprise Search Technology for Your Organization by Google Search Appliance

December 2010 - (Free Research)
Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market. 
(EGUIDE) READ ABSTRACT |

Case Study: Northern Trust Turns To Google For More Accurate and Relevant Search by Google Search Appliance

November 2010 - (Free Research)
In order to ensure regulatory compliance, Northern Trust's IT department needed a better tool to help employees quickly find the latest forms and information. Using the Google Search Appliance, OneBox and User-Added Results, Northern Trust increased both the accuracy and relevance of all intranet searches. Read this case study. 
(CASE STUDY) READ ABSTRACT |

Thinking Outside the (Search) Box: Powering Enterprise Search with Knowledge by Consona Corporation

June 2011 - (Free Research)
Enterprise search delivers the highest value when it helps create a great customer experience. Read this whitepaper to learn how execute enterprise search with knowledge. 
(WHITE PAPER) READ ABSTRACT |

Scaling Strategies for Mission-Critical Search Applications by Vivisimo, Inc.

January 2010 - (Free Research)
This paper will discuss scaling strategies for building flexible, high performance and high availability solutions for mission-critical search applications that will be able to handle the sheer amount of data while securely crawling and indexing all data repositories. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts