endpoint

Results 176 - 200 of 644Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya
Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro
Published By: ConnectWise     Published Date: Aug 22, 2019
The goal of automation is not to eliminate or replace human labor, but to increase productivity and quality beyond what is possible with your existing team, so as to realize economies of scale and predictable quality levels. With automation, your team is able to manage more endpoints, because automation eliminates routine and mundane responsibilities or efforts, giving your technicians the time to focus on higher priority and more complex tasks. In addition, as a managed service provider (MSP), you receive a fixed fee for your services. As a result, you need to provide service in the most efficient way possible while delivering the highest levels of consistency and quality. Building automation into your IT services business will enable you to do so. In this eBook, you’ll learn tips and best practices to successfully incorporate automation into your IT services business, including:
Tags : 
    
ConnectWise
Published By: ConnectWise     Published Date: Aug 22, 2019
There is a better way to master your client’s network, and it all begins with better network management strategies and tools that go beyond endpoint management alone. With these new solutions, you can drive down wait times through dynamic self-help options, see all of the device connections to take action before something goes wrong, and script out solutions for common problems—all from information in one easy and convenient place.
Tags : 
    
ConnectWise
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns and future plans of organizations in 12 countries and six continents. It provides deep insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks, as well as their experiences with endpoint detection and response (EDR) technologies.
Tags : 
    
Pine Cove Consulting
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. Check out this infographic for insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks.
Tags : 
    
Pine Cove Consulting
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Endpoint detection and response (EDR) tools are built to supplement endpoint security with increased detection, investigation, and response capabilities. However, the hype surrounding EDR tools can make it difficult to understand how exactly they can be used and why they are needed. Making matters worse, today’s EDR solutions often struggle to provide value for many organizations as they can be difficult to use, lack sufficient protection capabilities, and are resource intensive. Sophos Intercept X Advanced with EDR integrates intelligent EDR with the industry’s top-rated endpoint protection in a single solution, making it the easiest way for organizations to answer the tough questions about security incidents. Here are some additional reasons to consider an EDR solution.
Tags : 
    
Pine Cove Consulting
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency when you have multiple endpoints • How to get the best before, during and after attack protection Get the guide! "
Tags : 
    
Oracle + Dyn
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: Vidyo, Inc.     Published Date: Jan 18, 2010
Videoconferencing endpoints will grow by an order of magnitude in the next few years. The videoconferencing use model is going through a tremendous transformation. The decades-old conference room model is quickly giving way to more effective solutions. Download this whitepaper to discover more.
Tags : 
vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc
    
Vidyo, Inc.
Published By: ESET     Published Date: Jul 28, 2011
Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.
Tags : 
webcast, key consideration, eset, endpoint security, security, endpoint
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime
    
ESET
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec
Published By: Symantec     Published Date: Oct 19, 2012
Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools - which ones are currently best-of-class?
Tags : 
endpoint protection, symantec, data security, proactive tools, security analysis
    
Symantec
Published By: Symantec     Published Date: Oct 19, 2012
This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. It aims to compare the effectiveness of current anti-malware software. Read on to figure out which ran best.
Tags : 
virual environments, symantec, data security, malware, anti-malware products
    
Symantec
Published By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : 
symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware
    
Symantec
Published By: Symantec     Published Date: Oct 25, 2012
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
symantec, security, best practices, endpoint security, security detection, security education
    
Symantec
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security
    
Symantec
Published By: Symantec     Published Date: Nov 08, 2012
Results are in. Symantec Endpoint Protection rated best in independent, real-world tests recently published by Dennis Technology Labs. These tests are designed to more accurately reflect a simulated user environment.
Tags : 
virual environments, symantec, data security, malware, anti-malware products
    
Symantec
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
Published By: McAfee     Published Date: Sep 04, 2014
SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.
Tags : 
siem, sans, endpoint, red, correlación, integración, seguridad
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Saiba como é possível evitar ataques de rede utilizando uma plataforma de SIEM que combina dados históricos com dados em tempo real de origens de rede e políticas de segurança para oferecer contexto sobre o uso de aplicativos, comportamentos dos usuários e outras operações com o objetivo de produzir relatórios otimizados e mais precisos.
Tags : 
siem, sans, terminal, endpoint, rede, correlação, integração, segurança
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.