Endpoint Security Tools ProcurementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Endpoint Security Tools Procurement returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Wireless Security
 •   Enterprise Data Protection and Privacy
 •   Encryption and Key Management
 •   Managed Security Services

Related Searches
 •   Access Endpoint
 •   Endpoint Diagrams
 •   Endpoint Security Features
 •   Endpoint Services
 •   Find Endpoint Security
 •   List Endpoint Security
 •   Media Endpoint
 •   Researching Endpoint
 •   Schedule Endpoint Security
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World by Mainline Information Systems

May 26, 2011 - (Free Research)
Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line. 
(WEBCAST) READ ABSTRACT |

2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension

February 19, 2014 - (Free Research)
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits. 
(WEBCAST) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 30, 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

Endpoint Protection Platforms for Enterprises by Symantec Corporation

January 08, 2014 - (Free Research)
This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by SearchSecurity.com

September 17, 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

10 Best Practices for Microsoft SharePoint Security by Thawte Inc.

September 27, 2013 - (Free Research)
In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

College Board Case Study: Quality Software is Secure Software by IBM

July 22, 2013 - (Free Research)
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe. 
(WEBCAST) READ ABSTRACT |

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.

December 30, 2011 - (Free Research)
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by Trusteer

December 20, 2012 - (Free Research)
In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Also inside, discover the growing need for effective antimalware – read on to learn more today. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security: Defining the Total Cost of Ownership by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 10, 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

Think Your Anti-Virus Software Is Working? Think Again by Lumension

April 01, 2011 - (Free Research)
This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security. 
(WHITE PAPER) READ ABSTRACT |

Stepping Up the Battle Against Advanced Threats by Trusteer

August 30, 2013 - (Free Research)
Read this white paper which breaks down how application control is going to keep your endpoints secure in this changing IT threat landscape. 
(WHITE PAPER) READ ABSTRACT |

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by Core Security Technologies

October 11, 2013 - (Free Research)
This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

December 15, 2008 - (Free Research)
Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance. 
(WHITE PAPER) READ ABSTRACT |

Antivirus Protection for Virtual Desktops by Dell, Inc. and Intel®

December 15, 2011 - (Free Research)
With more and more organizations implementing VDI, enterprises have to find new ways of addressing current security challenges. Discover how to secure your VDI implementation and endpoints in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 11, 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Security with Intel® Trusted Execution Technology by Dell, Inc. and Intel®

August 29, 2013 - (Free Research)
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more! 
(VIDEO) READ ABSTRACT |

Supply Chain Analysis: From Quartermaster to Sunshop by FireEye

February 27, 2014 - (Free Research)
This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Endpoint Comparative Report Performed by AV-Test.org by Trend Micro, Inc.

January 31, 2011 - (Free Research)
In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Website Security with Algorithm Agility by Symantec Corporation

February 21, 2013 - (Free Research)
Read this whitepaper to learn more about algorithm agility, its role in today's security landscape, and how it is helping businesses enhance online security through a more flexible, scalable approach to SSL certification. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts