end point security

Results 176 - 200 of 338Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : encryption, bitlocker, data protection, endpoint, security, best practices
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : whitelisting, endpoint security, av signatures, patch management
     Lumension
By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : security, network security, network protection, data security, data protection, cyber attack, case study
     Lumension
By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control
     Lumension
By: Lumension     Published Date: Jan 22, 2013
You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt
     Lumension
By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
     Intel
By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
     Kaseya
By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
     McAfee
By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : cloud, it pros, security, dlp, cloud securiity, it management
     Box
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : endpoint security, security policy, mobile devices, networking, security, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : cloud security, virtualization security, virtualization, data center, security, it management, wireless, knowledge management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : user protection, security, cloud, endpoint, application, network, networking, it management
     CDW-Trend Micro
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
     CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com