Endpoint Security Definition MarketingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Security Definition Marketing returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Wireless Security
 •   Mobile Device Management
 •   Anti-Virus Solutions

Related Searches
 •   Demo Endpoint Security Definition
 •   Endpoint Electronic
 •   Endpoint Security Assessment
 •   Endpoint Security Canada
 •   Endpoint Security Capacities
 •   Endpoint Security Definition Accounts
 •   Endpoint Security Definition Kentucky
 •   Endpoint Security View
 •   Endpoint Technical
 •   Function Of Endpoint Security
Advertisement

ALL RESULTS
1 - 25 of 418 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

PC on a Stick: A Portable Endpoint Security Nightmare by Lumension

January 01, 2007 - (Free Research)
Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Presentation Transcript: The Economics of Endpoint Security by Sophos UK

June 24, 2009 - (Free Research)
Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Endpoint Security Suites Take Center Stage in the Enterprise by Symantec Corporation

January 04, 2013 - (Free Research)
This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other. 
(ANALYST REPORT) READ ABSTRACT |

2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension

February 19, 2014 - (Free Research)
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits. 
(WEBCAST) READ ABSTRACT |

The Consumerization of IT 101 by SearchSecurity.com

February 14, 2012 - (Free Research)
Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT. 
(EGUIDE) READ ABSTRACT |

June Information Security Magazine by SearchSecurity.com

June 05, 2013 - (Free Research)
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP. 
(EZINE) READ ABSTRACT |

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked by McCabe Software, Inc.

April 19, 2012 - (Free Research)
<p>The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.</p> 
(WHITE PAPER) READ ABSTRACT |

Cybercrime and warfare: All that matters by ComputerWeekly.com

December 04, 2013 - (Free Research)
Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters. 
(BOOK) READ ABSTRACT |

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation

March 13, 2009 - (Free Research)
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security. 
(DOWNLOAD)

A Buyer's Guide to Data Loss Protection Solutions by Websense, Inc.

July 14, 2011 - (Free Research)
Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 10, 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Trend Micro Endpoint Comparative Report Performed by AV-Test.org by Trend Micro, Inc.

January 31, 2011 - (Free Research)
In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture by Webroot

January 31, 2014 - (Free Research)
This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods. 
(WHITE PAPER) READ ABSTRACT |

Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments by Trend Micro, Inc.

October 20, 2010 - (Free Research)
This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 20, 2009 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST NEWS) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 20, 2005 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST REPORT)

Mobile Device Data Protection: Key Findings and Players in the Market by SearchSecurity.com

June 14, 2013 - (Free Research)
This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint. 
(EGUIDE) READ ABSTRACT |

Magic Quadrant for Endpoint Protection Platforms by Sophos, Inc.

April 11, 2011 - (Free Research)
Read this Market Overview of the different malware protection and prevention solutions that various vendors are offering. 
(PRODUCT OVERVIEW) READ ABSTRACT |

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 06, 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

Rethink Defense-In-Depth Security Model For BYOD by SearchSecurity.com

July 03, 2013 - (Free Research)
This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised. 
(EGUIDE) READ ABSTRACT |

TechGuide: Endpoint Security Management by SearchSecurity.com

September 11, 2013 - (Free Research)
This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months. 
(EGUIDE) READ ABSTRACT |

Creating a Network Endpoint Security Policy for Hostile Endpoints by SearchSecurity.com

February 28, 2013 - (Free Research)
Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully. 
(EGUIDE) READ ABSTRACT |

Enforcing Endpoint Security: Creating a Network Security Policy by SearchSecurity.com

June 21, 2012 - (Free Research)
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 418 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts