IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
1 - 25 of 329 Matches Previous Page  |  Next Page
Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014

JAMF Software

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: Consumerization gives employees a choice, and they're choosing personal products, such as Mac laptops and iOS and Android phones. However, this opens up a world of security risks. Download this white paper to learn about managing and securing Macs and other mobile devices.
Posted: 06 Nov 2015 | Published: 28 Jan 2015

Centrify Corporation

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: This security report provides a penetrating analysis of how IT security professionals perceive cyberthreats and plan their defense against them. Read on to learn how software defined networking (SDN) can help to mitigate this onslaught of threats.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Solving the App Gap to Ensure Enterprise Mobility Success
sponsored by StarMobile
WHITE PAPER: This white paper explains how to solve the "app gap" that exists between application virtualization and endpoint security in a largely BYOD world. Learn about three emerging technologies that aim to solve these mobile enterprise limitations.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014


Don't Wait Until Next Year to Build Better Defenses
sponsored by Intel Security
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Intel Security

Old PCs Put Your Business at Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.
Posted: 07 Oct 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

IT's Confidence in Threat Defenses May Be Misplaced
sponsored by Intel Security
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Intel Security

Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014


Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


Beyond Mobile Device Security: Comprehensive Endpoint Security for SMBs
sponsored by Earthlink.
WHITE PAPER: This white paper addresses the unique challenges of mobile security in an SMB environment and gives suggestions for tackling those challenges.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how you can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


Protecting Today's Endpoints: Rankings of Eight Endpoint Security Products
sponsored by Webroot
WHITE PAPER: This report contains the test results of eight different endpoint security systems, rating them on thirteen performance metrics so you can see which would work best for you.
Posted: 04 Sep 2015 | Published: 31 Aug 2015


Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc.
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 04 Sep 2015 | Published: 18 Mar 2015

Dell, Inc.

A New Approach to Endpoint Security
sponsored by Webroot
WHITE PAPER: Access this white paper to learn how you can take a new approach to security that provides unmatched protection for your devices and those of your customers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


The impact of virtualization security on your VDI environment
sponsored by BitDefender
WHITE PAPER: This paper outlines how the impact of endpoint security on virtualized environments is directly related to the achievable consolidation ratios (the number of virtual machines that can be run on each physical host).
Posted: 02 Sep 2015 | Published: 29 May 2015


Evolutions in Endpoint Security
sponsored by Webroot
WHITE PAPER: This survey report examines what security professionals see as today's most pressing endpoint security imperatives and how they believe endpoint security will change in the future.
Posted: 31 Aug 2015 | Published: 31 Dec 2014


Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014


VARs: Gain More Reliable Revenue from Endpoint Security
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based options as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015


A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper explores how the cloud is revolutionizing endpoint security, and what that means for you and your customers.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

1 - 25 of 329 Matches Previous Page    1 2 3 4    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement