IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityWhite Papers (View All Report Types)
1 - 25 of 289 Matches Previous Page  | Next Page
Protect your Devices with File Sync and Share Platform
sponsored by Code42
WHITE PAPER: This white paper highlights a continuous, secure, enterprise-ready file sync and share platform that facilitates real-time collaboration across all devices.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Code42

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture
sponsored by Webroot
WHITE PAPER: This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014

Webroot

Redefining Defense-in-Depth
sponsored by Lumension
WHITE PAPER: This exclusive report examines how traditional protection solutions are decreasing in effectiveness and discusses a new defense-in-depth approach that can keep you endpoints safe from even the most malicious attackers.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Crashplan Enterprise Cloud Deployment Strategies
sponsored by Code42
WHITE PAPER: This white paper highlights a system that lets organizations select their preferred cloud deployment strategy, ensuring they meet or exceed industry standards for data security. Read on to get the flexibility you desire, and the security you need.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Sophos, Inc.

Top 10 Considerations when Selecting a Secure Text Messaging Solution
sponsored by TigerText, Inc.
WHITE PAPER: This resource offers tips on how to choose a text messaging vendor that offer secure and compliant functionality for use in the workplace.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus
sponsored by Lumension
WHITE PAPER: Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Lumension

Channel Edge Reseller Program
sponsored by Webroot
WHITE PAPER: This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Channel Edge MSP Program
sponsored by Webroot
WHITE PAPER: This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.
Posted: 16 Apr 2014 | Published: 30 Aug 2013

Webroot

Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

Addressing the Malware Challenge: Strategies At Work
sponsored by Sourcefire
WHITE PAPER: This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Posted: 07 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Improve IT maturity to accelerate your move to cloud computing
sponsored by IBM
WHITE PAPER: This whitepaper examines the endpoint management capabilities required to simplify the delivery of IT capacity, enhance patch management for virtualized systems, speed the delivery of IT-services and improve information access.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

IBM

ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014

Hewlett-Packard Company

Nine Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell and Microsoft
WHITE PAPER: This guide explores 9 simple tips for effective patch management and how these steps can greatly enhance security.
Posted: 25 Mar 2014 | Published: 28 Oct 2013

Dell and Microsoft

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 21 Mar 2014 | Published: 30 Nov 2013

Dell, Inc.

End Point Security in Medium and Large Organizations
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell, Inc.

The Pressing Need to Improve Incident Response
sponsored by NetCitadel
WHITE PAPER: This guide explores the importance of effective incident response and how with the right strategy, you can greatly enhance your security.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

NetCitadel

IBM Security Services Client Reference Guide
sponsored by IBM
WHITE PAPER: This in-depth guide explores essential case studies that will help you understand the evolving threat landscape and learn from your peers' compliance challenges.
Posted: 19 Mar 2014 | Published: 30 Nov 2013

IBM

Critical Factors to Endpoint Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc.

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 18 Mar 2014 | Published: 30 Sep 2013

IBM
1 - 25 of 289 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement