endpoint data

Results 1 - 25 of 83Sort Results By: Published Date | Title | Company Name
Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: Dell     Published Date: May 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
collaboration, it tools, it solutions, data security, endpoint security
    
Dell
Published By: Dell     Published Date: Nov 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about what you need to keep endpoints and data secure Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S.
Tags : 
    
Dell
Published By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : 
storage systems, network, hardware components, architectural, storage software, integrated software
    
Pure Storage
Published By: Dell     Published Date: Sep 18, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
    
Dell
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft® infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint®, Skype for Business, or Active Directory® deployed on the network, in Azure®, or as part of your Office 365® subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Published By: Symantec     Published Date: Oct 19, 2012
Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools - which ones are currently best-of-class?
Tags : 
endpoint protection, symantec, data security, proactive tools, security analysis, security, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security, security, business technology, research
    
Symantec
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Absolute Software
Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint
    
EVault Inc.
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Published By: CommVault     Published Date: Jun 10, 2015
For optimum protection while enhancing user productivity, consider the following features in this buyers guide.
Tags : 
protection, backup, productivity, flexibility, network management
    
CommVault
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data, business technology
    
LogRhythm
Published By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : 
database, cloud, applications, endpoint, datastax
    
Datastax
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
    
Shavlik Technologies
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft
Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.