IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityWhite Papers (View All Report Types)
101 - 125 of 300 Matches Previous Page  | Next Page
CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by SearchSecurity.com
WHITE PAPER: Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

Tolly Test Report: IBM Security Network IPS GX7800 Comparative Efficacy and Performance Evaluation
sponsored by IBM
WHITE PAPER: This whitepaper will help you gain an understanding of the comparative efficacy and performance of different intrusion prevention system (IPS) solutions. Read on to discover the findings of IPS product tests.
Posted: 08 Mar 2013 | Published: 31 Dec 2012

IBM

Best Practices for Making BYOD Simple and Secure
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper presents practical guidance and best practices for using desktop virtualization, a self-service app store and secure file sharing and synchronization to deliver on-demand files, apps and desktops to any type of device, allowing organizations to leverage the full power of consumerization.
Posted: 19 Nov 2012 | Published: 30 Mar 2012

Citrix Systems, Inc.

Delivering Enterprise Information Securely on Android and Apple iOS Devices
sponsored by Citrix
WHITE PAPER: This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control.
Posted: 16 Oct 2012 | Published: 30 Apr 2012

Citrix

Exploring new web browser security capabilities
sponsored by SearchSecurity.com
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

SearchSecurity.com

Controlling Laptop and Smartphone Access to Corporate Networks
sponsored by Dell Software
WHITE PAPER: Mobile devices are conduits of greater access and information, but can serve as a vehicle for malware and other security threats. Find out how your IT department can enable secure access for mobile devices and laptops to ensure network integrity and security.
Posted: 18 Sep 2012 | Published: 18 Sep 2012

Dell Software

Lumension Guide to Device Control Best Practices
sponsored by Lumension
WHITE PAPER: This white paper provides a practical guide to assist you with the deployment of a device control module as part of your endpoint security management. Learn how you can prevent malware, ensure data protection and more.
Posted: 17 Sep 2012 | Published: 14 Sep 2012

Lumension

Lumension Guide to Patch Management Best Practices
sponsored by Lumension
WHITE PAPER: Access this white paper to discover patch management best practices. Learn how to better mitigate risk and remediate vulnerabilities.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

Lumension

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by McAfee, Inc.
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER: This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

Revolutionary architecture, evolutionary deployment
sponsored by Cisco
WHITE PAPER: Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more.
Posted: 08 Apr 2013 | Published: 28 Feb 2013

Cisco

9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution
sponsored by ClickSoftware
WHITE PAPER: This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.
Posted: 04 Apr 2013 | Published: 31 Dec 2012

ClickSoftware

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys

IT Security Management McAfee ePolicy Orchestrator Deep Command
sponsored by Intel
WHITE PAPER: This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.
Posted: 02 Jan 2013 | Published: 31 Dec 2011

Intel

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation
101 - 125 of 300 Matches Previous Page    3 4 5 6 7 8    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement