Purchasing Endpoint Security RelatedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Purchasing Endpoint Security Related returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Access Control
 •   Wireless Security
 •   Anti-Virus Solutions
 •   Mobile Device Management

Related Searches
 •   Purchasing Conversion
 •   Purchasing Diagrams
 •   Purchasing Endpoint Licenses
 •   Purchasing Endpoint Security Kentucky
 •   Purchasing Endpoint Security Montana
 •   Purchasing Endpoint Security Summary
 •   Purchasing Sheets
 •   Purchasing Survey
 •   Purchasing Trends
 •   Video Purchasing Endpoint Security
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture by Webroot

January 2014 - (Free Research)
This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods. 
(WHITE PAPER) READ ABSTRACT |

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc.

December 2008 - (Free Research)
McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor. 
(WHITE PAPER)

Symantec Endpoint Protection Small Business Edition 12 by Symantec Corporation

May 2011 - (Free Research)
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Symantec Endpoint Protection 12 by Symantec Corporation

May 2011 - (Free Research)
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Creating the Ultimate Security Platform by IBM

June 2013 - (Free Research)
This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations. 
(WHITE PAPER) READ ABSTRACT |

Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by SearchSecurity.com

October 2013 - (Free Research)
In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy. 
(EGUIDE) READ ABSTRACT |

Endpoint Security Suites Take Center Stage in the Enterprise by Symantec Corporation

January 2013 - (Free Research)
This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other. 
(ANALYST REPORT) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2009 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST NEWS) READ ABSTRACT |

Presentation Transcript: Making Time for Endpoint Security by BigFix

November 2010 - (Free Research)
This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Economics of Endpoint Security by Sophos UK

June 2009 - (Free Research)
Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by Shavlik Technologies

May 2005 - (Free Research)
This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more. 
(ANALYST REPORT)

McAfee Tackles the Complexities of Endpoint Security by McAfee, Inc.

December 2008 - (Free Research)
McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor. 
(WHITE PAPER) READ ABSTRACT |

2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension

February 2014 - (Free Research)
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits. 
(WEBCAST) READ ABSTRACT |

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4 by Symantec Corporation

March 2009 - (Free Research)
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security. 
(DOWNLOAD)

A Buyer's Guide to Endpoint Protection Platforms by McAfee, Inc.

April 2012 - (Free Research)
This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Endpoint Comparative Report Performed by AV-Test.org by Trend Micro, Inc.

January 2011 - (Free Research)
In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials for Business Decision Makers by Microsoft

November 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. Watch this video to learn more! 
(VIDEO) READ ABSTRACT |

Select the right solution for endpoint management by IBM

August 2012 - (Free Research)
Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments by Trend Micro, Inc.

October 2010 - (Free Research)
This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014) by Webroot

February 2014 - (Free Research)
This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria. 
(WHITE PAPER) READ ABSTRACT |

Acumin Contract Rate Index August 2012 by ComputerWeekly.com

September 2012 - (Free Research)
Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Securing microsoft exchange 2010 With Thawte SSL Certificates by Thawte Inc.

July 2011 - (Free Research)
Security continues to be a facet of Exchange technology that must be managed, and your secure sockets layer (SSL) certificates are the key to managing security for Exchange servers. Access this expert white paper now to get an overview of SSL certificates for Exchange 2010. 
(WHITE PAPER) READ ABSTRACT |

Cisco Prime Network Control System 1.1 by Cisco Systems, Inc.

June 2012 - (Free Research)
This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts