logo

Endpoint Security:  Technology in Action

Endpoint Security: Technology in Action

Provided by Kaspersky Lab

In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection? Download Kaspersky Lab's "Endpoint Security for Business: Technology in Action" to learn...

View Abstract

Endpoint Security:  Technology in Action

Endpoint Security: Technology in Action

Provided by Kaspersky Lab

In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection? Download Kaspersky Lab's "Endpoint Security for Business: Technology in Action" to learn...

View Abstract

Take it to the Board

Take it to the Board

Provided by Kaspersky Lab

When enterprises are determining their cybersecurity budgets, there is one element that cannot be ignored—the input of the Board of Directors. Research shows that when executives get involved and truly understand the risks to their organizations, security...

View Abstract

Take it to the Board

Take it to the Board

Provided by Kaspersky Lab

When enterprises are determining their cybersecurity budgets, there is one element that cannot be ignored—the input of the Board of Directors. Research shows that when executives get involved and truly understand the risks to their organizations, security...

View Abstract

Top 6 Security Use Cases for Automated Asset Inventory

Top 6 Security Use Cases for Automated Asset Inventory

Provided by Qualys

Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today's distributed enterprise, however, it's essential. Since the apps, systems, and services your users...

View Abstract

Top 6 Security Use Cases for Automated Asset Inventory

Top 6 Security Use Cases for Automated Asset Inventory

Provided by Qualys

Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today's distributed enterprise, however, it's essential. Since the apps, systems, and services your users...

View Abstract

Global IT Security Risks Survey

Global IT Security Risks Survey

Provided by Kaspersky Lab

How important is security for your virtual infrastructure? How much do businesses trust the security of their SaaS providers? For the 5th year in a row, Kaspersky Lab addresses these questions and other IT security concerns in its 2015 Global IT...

View Abstract

Reeling in Ransomware: Data Protection for You and Your Users

Reeling in Ransomware: Data Protection for You and Your Users

Provided by Code42

Reeling in Ransomware provides a history of cryptoviral extortion, the most malicious of ransomware strains. In the past five years, hackers have reached new criminal heights powered by encryption technology sophistication. Since 2013, the Department...

View Abstract

Are Energy and Utilities at Risk of a Major Breach?

Are Energy and Utilities at Risk of a Major Breach?

Provided by BitSight Technologies

Cyber security has continued to grab the headlines over the past year, as major breaches have affected companies across all industry sectors. The question on every mind is which industry faces the greatest risk? To answer this question and get a true...

View Abstract

Implementing a secure enterprise mobility management solution

Implementing a secure enterprise mobility management solution

Provided by Citrix

"Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management,...

View Abstract

Search by Category