endpoint data

Results 26 - 50 of 103Sort Results By: Published Date | Title | Company Name
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Workday     Published Date: Feb 27, 2018
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business. System complexity is increasing, though. Enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks.
Tags : 
business, enterprises, cloud, organisations, cybercrime
    
Workday
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint, corporate, risk, regulatory, financial, exposure, security, policies, backup and recovery, storage, data center design and management, data center
    
EVault Inc.
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
    
McAfee
Published By: CommVault     Published Date: Jun 10, 2015
For optimum protection while enhancing user productivity, consider the following features in this buyers guide.
Tags : 
protection, backup, productivity, flexibility, network management
    
CommVault
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data, business technology
    
LogRhythm
Published By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : 
database, cloud, applications, endpoint, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker, data center design and management
    
Shavlik Technologies
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft
Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, data security
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Download the white paper today to learn why local dedupe is the superior choice to global dedupe.
Tags : 
    
Code42
Published By: Sophos     Published Date: Dec 17, 2012
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets.
Tags : 
endpoint, antivirus, anti-spyware, firewall, endpoint security, data loss prevention, security
    
Sophos
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Start   Previous    1 2 3 4 5    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com