Skip to main content
 

endpoint

Results 201 - 225 of 644Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
Published By: Polycom     Published Date: Jul 30, 2014
In this MarketScope report, Gartner evaluated seven group video conferencing vendors on business model, customer experience, market responsiveness and track record, marketing execution, product strategy, and overall viability. They conclude that the introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration, and that IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications.
Tags : 
marketscope, group video, system, business model, customer experience, marketing execution, market responsiveness, viability
    
Polycom
Published By: Oracle     Published Date: Feb 21, 2018
A basic chatbot isn’t that hard to build. In JavaScript, write a public REST endpoint to connect a Facebook page to some chat logic (botly is a popular option) and deploy the whole thing to run on a cloud platform. Zoom out to the bigger picture, though, and you see that Facebook is just one channel. If you use Skype, Slack, Kik, and digital voice assistants, you’ll have to build six or eight of these endpoints straight away. And chatbots are being asked to handle ever more complex responses, so you better build on a platform of machine learning and natural language processing to keep up. That’s why the question enterprise developers should be asking is not “Which chatbot service do I start with?” but “Which platform will let me crank out a chatbot today and also support multiple channels and integrate with back-end systems as these chatbots take off?”
Tags : 
    
Oracle
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Google Chrome Enterprise     Published Date: Feb 14, 2018
xxx
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: Feb 20, 2018
xxx
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Webroot UK     Published Date: Feb 04, 2013
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh.
Tags : 
webroot, security, software, endpoint devices, networks, it staff
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint, security, virtualization, environments, performance, protection, manageability
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
The Webroot solution provides customers with a layered approach to security including products for Web and email security, email archiving and endpoint security. Offerings can be implemented as an integrated suite or as individual point products.
Tags : 
solution, malware, email archiving, endpoint security, individual point products, web
    
Webroot UK
Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
McAfee
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : 
endpoint protection, security, performance test, comparison, windows 8
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on six Enterprise Endpoint Security products. Download the report to find out results from these performance tests.
Tags : 
endpoint protection, security, performance test, comparison
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : 
endpoint protection, security, performance test, comparison
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
endpoint protection, security, best practices, survey
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Read this comparison test to find out which antivirus Protection product is right for you.
Tags : 
antivirus, endpoint, protection, security, test, comparison, symantec
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
endpoint protection, security, overview
    
Symantec
Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : 
forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security
    
ForeScout
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection
    
Webroot Inc
Published By: VMware     Published Date: Jan 05, 2018
Few network and IT managers look forward to migrating critical systems and solutions from one vendor to another, but it is often an essential step forward when evolving operational requirements are considered. When migration is viewed as an opportunity, the new benefits and broad range of quantifiable advantages realized can make switching vendors the optimal solution. Read this Tech Target whitepaper to learn more and see why now is the best time to migrate from MobileIron to VMware Workspace ONE, powered by VMware AirWatch unified endpoint management (UEM) technology.
Tags : 
    
VMware
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.