HIT Consultant Insightful coverage of healthcare innovation
 

endpoint security solution

Results 51 - 70 of 70Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : 
endpoint security, web security, it security, security solutions, case study, mobile security, mobility
    
Webroot
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: Webroot Inc     Published Date: Sep 14, 2015
Webroot SecureAnywhere® Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook.
Tags : 
endpoint protection, security software, user protection
    
Webroot Inc
Published By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : 
aberdeen, free av, endpoint security
    
Intel Security
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
    
CarbonBlack
Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyberattacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
Tags : 
    
Cisco
Published By: Sophos     Published Date: Jan 10, 2013
Evaluating the many components that make up an endpoint security solution may seem overwhelming. This buyers guide is designed to help. We’ve provided you with independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
sophos, security applications, web protection, spyware, secure data, antispam
    
Sophos
Published By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : 
ation security, information technology, trend micro
    
Trend Micro
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows, attacks, apple, linux, mobile, operating systems, solutions, endpoint, protection
    
ESET
Published By: IBM     Published Date: Sep 10, 2013
This guide discusses the benefits of each capability and provides checklists to help you evaluate whether or not a particular vendor's solution addresses each of these areas effectively. You will also find a list of attributes and capabilities yous should look for in selecting a provider that can support the full breadth of your endpoint management requirements.
Tags : 
endpoint management, endpoint, security, ibm, it management, capabilities, vendor solutions, endpoint solutions
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.