RecruitingBlogscom

Follow Us:

 

endpoint management

Results 51 - 75 of 125Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
    
McAfee
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Learn how Citrix Workspace enables a flexible workplace that helps your organization become productive, innovative, and attractive to top talent. In this eBook, you will learn how to: - Empower employees and teams anywhere, on any device - Simplify and improve both security and endpoint management - Adopt new technologies more quickly and effectively"
Tags : 
    
Citrix Systems
Published By: MuleSoft     Published Date: Jun 27, 2019
Banks of all sizes, from multinational firms to regional credit unions, face unparalleled pressure to digitally transform in the face of evolving customer expectations. Learn how a top 10 bank partnered with MuleSoft to address these pressures by developing an application network to rapidly modernize legacy systems, digitally transform mortgage lending, and accelerate Salesforce implementation. Read this whitepaper to learn: How banks can leverage APIs to accelerate integration between core banking systems, legacy applications, and modern SaaS endpoints. The step-by-step approach a top 10 bank took to build a Center for Enablement (C4E) and transform their SDLC to accelerate application development. How the bank created unified customer experiences across different product lines, from mortgages to wealth management, across in-person, and digital engagement channels.
Tags : 
    
MuleSoft
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
    
Shavlik Technologies
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection, security
    
Webroot UK
Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security
    
ESET
Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt
    
Lumension
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity, wireless, knowledge management, data management, business technology, data center
    
EMA
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
    
Kaseya
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques
    
Lumension
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top