IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
1 - 25 of 326 Matches Previous Page  |  Next Page
Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Learn more about each step of an attack by exploring 4 examples so that you can better prepare your defenses.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deeper look at the history of malware attacks and potential countermeasures to thwart new ones. Also uncover 3 major challenges of file share attacks, recommendations to overcome these challenges, and more.
Posted: 12 Jul 2017 | Published: 31 Dec 2016

BlackBerry

DaaS Provider Evaluation Checklist
sponsored by Dizzion
WHITE PAPER: With so many options and vendors out there, researching desktop as a service (DaaS) can be a time consuming task. What questions should you ask? What should you be evaluating? Download this checklist to gain a real-world, hands-on tool to use to make the information gathering process easier.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Dizzion

Don't Settle for a Patchwork: Synch-up your Security Solutions
sponsored by Sophos, Inc.
WHITE PAPER: Patchwork solutions working in isolation can't keep up with coordinated, complex attacks. Discover how endpoint and network security can work in concert to protect your enterprise from today's threats.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Sophos, Inc.

Security Considerations for Next Generation Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: Endpoint compliance assessments are critical for today's mobile workforce environment. This white paper explains how and where next-generation endpoint compliance should be enforced, as well as additional considerations that are critical for ensuring a secure network.
Posted: 27 Jun 2017 | Published: 18 Mar 2016

Aruba Networks

Endpoint Visibility: Prerequisite for Today's Security
sponsored by Aruba Networks
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next 3 years, and the well-publicized security breaches of late, there is a warranted demand among IT pros for real-time visibility and reporting. Learn how continuous monitoring and profiling of connected devices could be your ticket to modern endpoint security.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Aruba Networks

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell India

Improved Security, Lower Costs: How Companies Can Benefit From SEDs
sponsored by Micron
WHITE PAPER: Delve into a flash-based SED vs. HDD-based storage comparison with acquisition costs analyzed, and attention paid to stacking up hardware- vs. software-based encryption. Read on to learn how SEDs eliminate time-consuming key management, and more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Micron

How Flash-based SEDs Relieve Strain on IT
sponsored by Micron
WHITE PAPER: Discover how flash-based self-encrypting drives (SEDs) not only simplify the planning, operation, and expansion of storage systems, they also serve as the foundation for sustainable, secure storage. Read on to see how SEDs securely eliminate the lengthy overwriting of storage media that traditional HDDs have to undergo.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Micron

Return on Infrastructure: SSDs and SEDs Reap the "New ROI" with Superior Security
sponsored by Micron
WHITE PAPER: Learn how to use storage hardware-level encryption to improve data backup and security, in the form of SSDs and self-encrypting drives (SEDs), by downloading this resource. Read on to compare these drives to traditional HDD and software-based solutions in the areas of data security, EOL management, and DR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Micron

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Secure your Microsoft Environment. From the Network to the Cloud to the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: The challenge your organization faces is how to best protect your infrastructure from cyberattacks. Discover ways to adopt a prevention-first security posture that protects the network and digital assets.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

PwC: A Security Framework for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco
1 - 25 of 326 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement