IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Multimedia (View All Report Types)
1 - 25 of 82 Matches Previous Page  |  Next Page
Forensic State Analysis: A New Approach to Threat Hunting
sponsored by Infocyte
WEBCAST: Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.
Posted: 18 Sep 2017 | Premiered: Apr 3, 2017

Infocyte

What is a Non-malware Attack?
sponsored by Carbon Black
WEBCAST: Non-malware attacks leave a small footprint making them extremely hard to spot. Check out this 101 webcast to learn more about non-malware attacks and how you can protect yourself from them.
Posted: 24 Aug 2017 | Premiered: Aug 18, 2017

Carbon Black

Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

Mitigate Mobile Cloud App Risks
sponsored by MobileIron
VIDEO: Mobile apps are becoming the number one way employees are accessing cloud services, creating a new threat vector that you need to overcome: mobile app-to-cloud risk. This webcast explores 3 ways employees can introduce vulnerabilities by using cloud apps on mobile devices.
Posted: 07 Aug 2017 | Premiered: 07 Aug 2017

MobileIron

How Ransomware is Evolving into the Perfect Crime
sponsored by Barkly
WEBCAST: Ransomware is on the rise. The 2017 WannaCry ransomware attack impacted 300,000 systems in 150 countries, while NotPetya affected 100,000 systems in 65 countries. Access this in-depth webcast to get a full understanding of new ransomware trends.
Posted: 03 Aug 2017 | Premiered: Aug 3, 2017

Barkly

Security Product Overview: Cisco Umbrella
sponsored by Cisco Umbrella
VIDEO: Over 1/2 of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.
Posted: 27 Jul 2017 | Premiered: 11 Nov 2016

Cisco Umbrella

Podcast: Post-Password Security: AI, Risk-Based and Context
sponsored by Crossmatch
PODCAST: Weak and stolen passwords lead to data beaches, but how do you get rid of them? In this podcast, join experts Kevin Beaver and Jeff Carpenter as they explore the future of authentication post-password.
Posted: 26 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

How to manage end point devices when moving to Windows 10
sponsored by Citrix
WEBCAST: Not every device can run Windows 10 natively, but they can run it virtually with the right desktop virtualization platform. Watch this video to learn how to deliver Windows 10 without updating end point devices or impacting server density or network bandwidth.
Posted: 09 May 2017 | Premiered: Dec 10, 2015

Citrix

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Demo: Secure Browsing in the Cloud
sponsored by Authentic8, Inc.
VIDEO: Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.
Posted: 02 Aug 2017 | Premiered: 21 Dec 2016

Authentic8, Inc.

The Requirements of a Secure Browser
sponsored by Authentic8, Inc.
VIDEO: Traditional web browsers weren't built with today's threats in mind, and the gaps in infrastructure are being exposed. In this brief video, learn the full requirements of a secure browser.
Posted: 02 Aug 2017 | Premiered: 09 Jun 2015

Authentic8, Inc.

Why AirWatch EMM is the Future of Mac Management
sponsored by vmware airwatch
WEBCAST: Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast
sponsored by Intel Security
WEBCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security

Why Traditional Security Approaches Fail
sponsored by Intel Security
WEBCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.
Posted: 27 Jun 2016 | Premiered: May 1, 2016

Intel Security

Evolving Endpoint Security Controls for Effective Threat Protection
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Many security experts feel endpoint security controls no longer work against today's hackers and attackers. But the reality is that you may not be deploying or using your controls correctly. This Endpoint Security Resource Center provides 5 lessons and a quiz that can help to evolve your endpoint security protection.
Posted: 16 May 2016 | Premiered: 02 May 2016

SearchSecurity.com

Whiteboard: Barracuda Web Application Firewall
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.
Posted: 10 May 2016 | Premiered: 30 Jun 2015

Barracuda Networks

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope
1 - 25 of 82 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement