Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

endpoints

Results 201 - 219 of 219Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: CDW     Published Date: Nov 12, 2012
As mobility becomes commonplace, strategies for wireless and wired security must be woven together.
Tags : 
cdw, wireless, wired, security, wlans, endpoints, notebook computers, tablets, smartphones
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security, enterprise applications
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security
    
Cisco
Published By: Polycom     Published Date: Jul 24, 2014
The introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration. IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications. Download now to learn more!
Tags : 
polycom, gartner, marketscope, group video systems, endpoints, mobile, video portfolio
    
Polycom
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch, it management, wireless
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 15, 2016
Unified endpoint management (UEM) enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. AirWatch is the first leading platform to unify these endpoints together and the benefits organizations are seeing is tremendous.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Many Windows applications are traditional x86/x64 apps, which can be several GBs in size. To package and deploy apps to remote worker and branch office endpoints, organizations mostly rely on costly distribution servers, which are both capital and labor intensive. New Windows Software Distribution capabilities in AirWatch create a more efficient and enterprise scalable deployment experience that reduces bandwidth, infrastructure, and labor costs. • Manage the full lifecycle of Win32 apps - including deploying apps, dependencies and patches • Eliminate the challenges of complex app packaging, unreliable app installs and recurring OS imaging with App Stacks delivery • Distribute apps to remote and branch users with CDN and P2P capabilities and eliminate your distribution server footprint • Deliver apps in a unified app catalog and provide a consistent single sign-on experience for the user
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Over 350M Windows 10 devices have been deployed in less than a year, and the recent Windows 10 anniversary update has accelerated the planning of Windows 10 rollouts for the vast majority of enterprises.  This is the perfect time to evaluate your desktop deployment strategy.  In this session, we will discuss the how VMware Horizon can enable your journey to Windows 10, and the benefits of centrally deploying Windows 10 through virtual desktops. We will also discuss how VMware provides a comprehensive solution by managing your physical endpoints through AirWatch as well.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Sep 14, 2017
When evaluating and migrating to Windows 10, it is critical to understand the use cases and benefits of various deployment choices. Should you • Refresh or upgrade your existing deployments? • Migrate your physical endpoints to VDI? • Extend published remote apps to your Windows endpoints? We look at these use cases and introduce SysTrack - a tool that provides recommendations on an optimal Windows 10 deployment approach your organizations should take.
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.