Endpoint Security ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Security Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Wireless Security
 •   Managed Security Services
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Endpoint Roi
 •   Endpoint Security Alabama
 •   Endpoint Security Architecture Vendors
 •   Endpoint Security Outsourcing
 •   Endpoint Security Suite
 •   Endpoint Security Unix
 •   Endpoint Virginia
 •   Find Endpoint Security
 •   Hardware Endpoint Security Architecture
 •   Net Based Endpoint Security Architecture
Advertisement

ALL RESULTS
1 - 25 of 441 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 06, 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension

February 04, 2013 - (Free Research)
This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more. 
(WHITE PAPER) READ ABSTRACT |

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection by Webroot

September 17, 2013 - (Free Research)
This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks. 
(EGUIDE) READ ABSTRACT |

Critical Factors to Endpoint Security by Dell, Inc.

March 19, 2014 - (Free Research)
This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security Architecture – an outsourcer's view by ComputerWeekly.com

March 01, 2013 - (Free Research)
Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture. 
(PRESENTATION) READ ABSTRACT |

The 2014 Endpoint Security Buyers Guide by Lumension

August 16, 2013 - (Free Research)
This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology. 
(WHITE PAPER) READ ABSTRACT |

End Point Security in Medium and Large Organizations by Dell, Inc.

March 20, 2014 - (Free Research)
This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 06, 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks by FireEye

December 31, 2013 - (Free Research)
The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 16, 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

November 19, 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Real Deal about Windows Server 2008 R2, Part 1 - Latest Security Enhancements by Dell and Microsoft

May 21, 2010 - (Free Research)
This presentation transcript compares the first and second releases of Windows Server 2008. Discover security improvements to this enhanced operating system and learn how they impact your small or mid-sized business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 17, 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Conquer Endpoint Security Challenges with IBM Endpoint Manager by IBM

January 31, 2012 - (Free Research)
Explore this exclusive report to find out how IBM Endpoint Manager responds to today's endpoint challenges. 
(WHITE PAPER) READ ABSTRACT |

Revolutionary architecture, evolutionary deployment by Cisco (E-mail this company)

February 28, 2013 - (Free Research)
Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Select the Right Solution for Endpoint Management by IBM

May 31, 2013 - (Free Research)
This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance. 
(WHITE PAPER) READ ABSTRACT |

E-guide-- Endpoint security suites: What to consider before renewal by ESET

January 13, 2010 - (Free Research)
In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors. 
(EGUIDE) READ ABSTRACT |

Next-Generation IPS for Dummies by Sourcefire

January 01, 2013 - (Free Research)
Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook. 
(EBOOK) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 28, 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 30, 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Getting the Most Out of Your Next-Generation Firewall by Cisco (E-mail this company)

April 11, 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 13, 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 31, 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Acumin Contract Rate Index August 2012 by ComputerWeekly.com

September 27, 2012 - (Free Research)
Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 441 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts