• Winner: Best enterprise cloud app

    The winner of the best enterprise cloud app category in the Modern Infrastructure Impact Awards promises endpoint security for enterprise data.

    ITKE344,690 pointsBadges:
  • Audit finds endpoint security risks in every end-user company

    To make endpoint security really work, VARs will have to teach customers about real risks from USB, WiFi and other devices that poke holes in typical security plans.

    Colin Steele2,210 pointsBadges:
  • Sophos integrates encryption into endpoint, email security

    Sophos Endpoint Security and Data Protection is the first software to integrate encryption from its acquisition of Utimaco in 2008.

    NBRoiter815 pointsBadges:
  • Bug-weary Windows shops may accept all-in-one tools

    Comprehensive endpoint security tools for Windows are coming, and many battle-scarred IT managers are willing to take a look at them.

    ITKE344,690 pointsBadges:
  • Securing enterprise endpoints is key to IT control

    IT managers need all the help they can get locking down enterprise end points. This is especially true with mobile devices.

    ITKE344,690 pointsBadges:
  • Endpoint security may not keep your enterprise safe

    Endpoint security isn't everything. It's more important to prevent attacks in the first place.

    JonHassell1,085 pointsBadges:
  • Endpoint management FAQ for desktop admins

    The proliferation of consumer endpoints and concerns about mobile endpoint security are giving IT headaches. Answering these endpoint management questions could ease your pain.

    Eugene Demaitre75 pointsBadges:
  • Cisco, Microsoft partner on security, but products nowhere to be found

    The two tech titans have teamed up to augment end-point security, but experts are skeptical because it could be difficult for the vendors to live up to their promises.

    SearchCIO4,490 pointsBadges:
  • NAC and endpoint security frameworks: Which way to go?

    We've all heard about the Cisco and Microsoft initiatives for NAC, plus the standards-based Trusted Network Connect. What's the difference between these approaches and which, if any, should you choose to secure your endpoints and keep your local networks from being compromised?

    SearchCloudComputing1,290 pointsBadges:
  • How to find sensitive information on the endpoint

    Worried that your enterprise endpoints may be harboring sensitive information like credit card numbers or Social Security numbers? Fear not. Mike Chapple offers algorithms and tools to conduct a search and advice on dealing with the results.

    searchsecurity20,880 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.