BigFix

Results: 49



#Item
11Endpoint Defense:
 Essential Practices Version 1.4

Endpoint Defense:
 Essential Practices Version 1.4

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2015-03-30 09:30:11
12» Solution Brief Promisec Endpoint Manager Restoring Integrity across Infrastructure, Applications and Users

» Solution Brief Promisec Endpoint Manager Restoring Integrity across Infrastructure, Applications and Users

Add to Reading List

Source URL: www.promisec.com

Language: English - Date: 2014-04-07 10:06:50
13Case Study  TuWay Communications Chose “Systems” after other products failed The Situation

Case Study TuWay Communications Chose “Systems” after other products failed The Situation

Add to Reading List

Source URL: www.sysimp.com

Language: English - Date: 2011-03-04 12:55:54
14MaaS360.com > Case Study  The FRA used Fiberlink’s Mobile Device Management service to support its thousands of remote employees, help control costs and maintain security.

MaaS360.com > Case Study The FRA used Fiberlink’s Mobile Device Management service to support its thousands of remote employees, help control costs and maintain security.

Add to Reading List

Source URL: content.maas360.com

Language: English - Date: 2014-02-12 21:32:52
15OVAL Board MeetingAttendees Nick Connor – Assuria Limited Eric Walker – BigFix Inc. Steven Piliero – Center for Internet Security (CIS) Luis Nunez – CISCO

OVAL Board MeetingAttendees Nick Connor – Assuria Limited Eric Walker – BigFix Inc. Steven Piliero – Center for Internet Security (CIS) Luis Nunez – CISCO

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2010-10-28 19:46:04
16Should IT Vendor Consolidation Extend to Endpoint Security? As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the

Should IT Vendor Consolidation Extend to Endpoint Security? As IT organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. It could hinge on the

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-02 16:39:01
17LSI-1228 Secure User Mgmt Suite-Tech-Spec-en-LTR.indd

LSI-1228 Secure User Mgmt Suite-Tech-Spec-en-LTR.indd

Add to Reading List

Source URL: rs.landesk.com

Language: English - Date: 2014-06-05 12:59:10
18» Solution Brief  Promisec Endpoint Manager Detect and Remediate Cyber Incidents Without Deploying Agents Promisec Endpoint Manager is the first and only agentless solution that delivers complete visibility and remediat

» Solution Brief Promisec Endpoint Manager Detect and Remediate Cyber Incidents Without Deploying Agents Promisec Endpoint Manager is the first and only agentless solution that delivers complete visibility and remediat

Add to Reading List

Source URL: www.promisec.com

Language: English - Date: 2015-02-03 21:47:35
19IBM Software  Solution Brief Keeping distributed endpoints safe and

IBM Software Solution Brief Keeping distributed endpoints safe and

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-11-10 11:41:41
20F11_BellTechLogix_Folder_Template

F11_BellTechLogix_Folder_Template

Add to Reading List

Source URL: www.belltechlogix.com

Language: English - Date: 2014-01-16 09:49:58