End Point Security Reports

Desktop management tools still an IT staple
sponsored by TechTarget Enterprise Desktop
EBOOK: Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

TechTarget Enterprise Desktop

Fighting Cybercrime in the 21st Century
sponsored by TechTarget Security
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

TechTarget Security

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

Explore the latest enterprise mobile security technology
sponsored by TechTarget Mobile Computing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

TechTarget Mobile Computing

The role of Apple device management in modern business
sponsored by JAMF
EGUIDE: Many organizations rely on unified endpoint management for a variety of devices, but there's also a space for Apple device management in the modern enterprise. In this e-guide you'll discover new management support features for Apple devices and how they are making these devices more productive as business tools.
Posted: 23 Aug 2017 | Published: 18 Aug 2017

JAMF

Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
sponsored by VMware
WHITE PAPER: This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
Posted: 17 Oct 2014 | Published: 31 Jul 2014

VMware

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

How to Bolster Endpoint Security Protection
sponsored by Symantec
EGUIDE: This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Symantec

Sysinternals Still Essential for Desktop Troubleshooting
sponsored by TechTarget Enterprise Desktop
EBOOK: The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

TechTarget Enterprise Desktop

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM