End Point Security Reports

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

TechTarget ComputerWeekly.com

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Can New Security Tools Keep Your Network Clean?
sponsored by TechTarget Security
EZINE: Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TechTarget Security

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

Privileged Account Security
sponsored by CyberArk
EGUIDE: 55% of insider misuse is tracked to privileged account abuse, according to Verizon's Data Breach Investigations Report. Take a look at this expert e-guide to discover how to improve your security by limiting privileged accounts.
Posted: 22 Sep 2017 | Published: 19 Sep 2017

CyberArk

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell, Inc. and Intel®

Improve Endpoint Security with Advanced Tools and Techniques
sponsored by OPSWAT inc
EGUIDE: Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

All resources sponsored by OPSWAT inc

The Risks and Flaws of Open Source Security
sponsored by Flexera Software
EGUIDE: Is open source software too much of a risk for enterprises? Before using open source software, you should consider (and understand) the risks involved. In this expert e-guide, featuring tips from industry pros Mike O. Villegas and Michael Cobb, learn what you need to watch out for when it comes to open source security.
Posted: 01 Aug 2017 | Published: 27 Jul 2017

Flexera Software

Explore the latest enterprise mobile security technology
sponsored by TechTarget Mobile Computing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

TechTarget Mobile Computing

Computer Weekly: Going mobile in financial services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

TechTarget ComputerWeekly.com