IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityWhite Papers (View All Report Types)
1 - 25 of 294 Matches Previous Page  | Next Page
Buyer's Guide to Eneterprise File Sync and Share (that users will love)
sponsored by Code42
WHITE PAPER: Read this buyer's guide to evaluate sync/share solutions and ensure you choose one that aligns with your users' needs and your organizations' preferences.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Code42

Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
sponsored by VMware
WHITE PAPER: This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
Posted: 17 Oct 2014 | Published: 31 Jul 2014

VMware

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper describes endpoint backup's role in e-discovery, including the data collection and preservation capabilities it offers.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Code42

5 Steps to Worry-Free Endpoint Backup and Data Migration
sponsored by Code42
WHITE PAPER: This white paper provides five steps to worry-free endpoint backup and data migration, including identifying your basic endpoint backup needs.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

Disk Encryption + Endpoint Backup: Before You Lock it Down, Back it Up
sponsored by Code42
WHITE PAPER: Read this whitepaper for eight considerations for choosing an endpoint backup solution.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Code42

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


Private Cloud Considerations: Control and Confidence for Enterprise Teams (TechTarget)
sponsored by Code42
WHITE PAPER: Access this white paper to find out why an endpoint backup and cloud computing platform is right for organizations that are looking for the security of private clouds, but also need the control and cost efficiency of deploying the private cloud in an on-premises infrastructure.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Why You Can't Ignore Endpoint Backup Protection (TechTarget)
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Genentech: Prescription for Data Protection
sponsored by Code42
WHITE PAPER: Access this white paper to find out about the single, scalable, cross-platform solution for enterprise endpoint backup that Genentech implemented to give them peace of mind.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

HP TippingPoint – A New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: HP TippingPoint complements anti-virus defenses with a three-prong approach that detects and disrupts the malware lifecycle.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Hewlett-Packard Company

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

CIO survey All's not well at endpoints
sponsored by HP Autonomy
WHITE PAPER: This white paper explores the current endpoint security landscape and gives tips to help strike a balance between user experience for mobile workers and security requirements and control for IT.
Posted: 12 Aug 2014 | Published: 05 Mar 2014

HP Autonomy

Best Practices for Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Dell Software

There's Good Security and Then There's National Security
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about BlackBerry's top-tier line of defense, creating the ultimate end-to-end mobile security solution.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

Simplify Your Security Management with New Data Protection Solutions
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

CDW Corporation

Next-Gen Firewall and Endpoint Protection Meet the Needs of Today's Data Centers
sponsored by CDW Corporation
WHITE PAPER: This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

Keeping Advanced Persistent Threats in Check
sponsored by CDW Corporation
WHITE PAPER: This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company
1 - 25 of 294 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement