End Point Security Reports

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Nov 2018

TechTarget ComputerWeekly.com

Biometrics in the enterprise: An opportunity or an ethical minefield?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.
Posted: 08 Feb 2021 | Published: 17 Jun 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to zero-trust security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.
Posted: 08 Feb 2021 | Published: 09 Mar 2020

TechTarget ComputerWeekly.com

4 Top Identity and Access Management Trends
sponsored by Onfido
EGUIDE: As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.
Posted: 03 Jun 2019 | Published: 30 May 2019

Onfido

Securing the Internet of Things
sponsored by TechTarget Security
EBOOK: Discover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

TechTarget Security

Sysinternals Still Essential for Desktop Troubleshooting
sponsored by TechTarget Enterprise Desktop
EBOOK: The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

TechTarget Enterprise Desktop

Computer Weekly – 22 July 2014: Time to get serious about endpoint security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

TechTarget ComputerWeekly.com

Quocirca: Selecting a cloud printing platform
sponsored by TechTarget ComputerWeekly.com
RESOURCE: As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

TechTarget ComputerWeekly.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks