RSS feed Get our RSS feed

News by Topic

endpoint solution

Results 51 - 75 of 148Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : security, defense, cloud, threats, attack, symantec, enterprise, endpoint
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: Carbon Black     Published Date: Mar 27, 2019
Cyberattacks are rapidly evolving. It is more critical than ever that your company be protected by the latest innovations in endpoint security. And if you’re dealing with outdated antivirus solutions, your risk of experiencing damaging attacks is increasing exponentially.
Tags : 
     Carbon Black
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
     Group M_IBM Q2'19
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
     Cisco Umbrella EMEA
By: Vidyo, Inc.     Published Date: Jan 18, 2010
Videoconferencing endpoints will grow by an order of magnitude in the next few years. The videoconferencing use model is going through a tremendous transformation. The decades-old conference room model is quickly giving way to more effective solutions. Download this whitepaper to discover more.
Tags : vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc
     Vidyo, Inc.
By: ESET     Published Date: Jul 28, 2011
Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.
Tags : webcast, key consideration, eset, endpoint security, security, endpoint
     ESET
By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime
     ESET
By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
     Promisec
By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware
     Symantec
By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : endpoint protection, security, performance test, comparison
     Symantec
By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : virtualization, vmware, test, antivirus, security, protection
     Symantec
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
     CA Technologies EMEA
By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
     Trend Micro
By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : eset, security, threatsense, malware, threat trends, conficker, virus, agent
     ESET
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : endpoint, efficiency, security, prevention, technology, decision makers
     McAfee EMEA
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
     Secunia
By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: Webroot UK     Published Date: Sep 06, 2013
In today's world of employees spending hours online everyday with multiple devices, Webroot offers a unique portfolio of solutions for protecting endpoints. This consists of three offerings that can be deployed independently or in any combination. When implemented together, they provide far-reaching benefits. Read this whitepaper and learn how to get manageable endpoint, mobile device and web security together.
Tags : closing the circle, manageable endpoint solutions, webroot, security, webroot security suite, protecting endpoints
     Webroot UK
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics