IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
1 - 25 of 329 Matches Previous Page  |  Next Page
Old PCs Put Your Business at Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.
Posted: 07 Oct 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

The State Of Endpoint Security Adoption 2014 To 2015
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this special report, Forrester presents the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.
Posted: 06 Oct 2015 | Published: 15 Oct 2014

Dell, Inc. and Intel®

Streamline Endpoint Security with the Cloud
sponsored by Trustwave
WHITE PAPER: This white paper explains how putting endpoint security in the cloud can give you effective security that's both affordable and simple.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


Achieving Endpoint Protection with SANS Critical Security Controls
sponsored by Dell, Inc.
WHITE PAPER: This white paper presents twenty security controls suggested by the SANS Institute that will help you maintain endpoint security in today's complex IT environment.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Dell, Inc.

IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014


Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


EMM Vendor Report Card: How Do Mobility Providers Stack Up?
sponsored by VMware
WHITE PAPER: This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Beyond Mobile Device Security: Comprehensive Endpoint Security for SMBs
sponsored by Earthlink.
WHITE PAPER: This white paper addresses the unique challenges of mobile security in an SMB environment and gives suggestions for tackling those challenges.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


Refresh Authentication Choices to Improve Mobile Workforce Remote Access
sponsored by Okta
WHITE PAPER: This white paper presents the 9 top recommendations for strengthening your IDaaS strategy to secure remote access on all endpoints.
Posted: 09 Sep 2015 | Published: 28 Jan 2015


Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how organizations can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc.
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 04 Sep 2015 | Published: 18 Mar 2015

Dell, Inc.

A New Approach to Endpoint Security
sponsored by Webroot
WHITE PAPER: Access this white paper to learn how you can take a new approach to security that provides unmatched protection for your devices and those of your customers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


The impact of virtualization security on your VDI environment
sponsored by BitDefender
WHITE PAPER: This paper outlines how the impact of endpoint security on virtualized environments is directly related to the achievable consolidation ratios (the number of virtual machines that can be run on each physical host).
Posted: 02 Sep 2015 | Published: 29 May 2015


Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014


Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015


A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014


Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015


Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: This paper explains how predictive security leverages big data to pre-empt mobile threats before they can do harm. See examples of how predictive security was able to thwart two destructive mobile apps.
Posted: 24 Aug 2015 | Published: 05 Aug 2015


Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014


The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 13 Aug 2015 | Published: 25 Feb 2015


The Productivity Transformation: Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 12 Aug 2015 | Published: 15 Jul 2015

1 - 25 of 329 Matches Previous Page    1 2 3 4    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement