IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
151 - 175 of 328 Matches Previous Page  |  Next Page
Exploring new web browser security capabilities
sponsored by
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012


IT Security Management McAfee ePolicy Orchestrator Deep Command
sponsored by Intel
WHITE PAPER: This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.
Posted: 02 Jan 2013 | Published: 31 Dec 2011


2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012


Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012


EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER: Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012


Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011


The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

The Expanding Network Perimeter: How to Protect it With Unified Threat Management
sponsored by Sophos, Inc.
WHITE PAPER: Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Sophos, Inc.

Webroot Secure Anywhere Business Value Assessment
sponsored by Webroot
WHITE PAPER: Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice!
Posted: 13 Aug 2012 | Published: 13 Aug 2012


Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012


Hamilton Health Sciences brings care to the bedside with Citrix Receiver
sponsored by Citrix
WHITE PAPER: Healthcare traditions are changing and physicians are adopting more mobile practices. Access this informative white paper to learn more about how adopting mobile devices can improve patient care and physician productivity.
Posted: 12 Aug 2012 | Published: 07 Aug 2012


Webroot Secure Anywhere - Endpoint Protection
sponsored by Webroot
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012


IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere
sponsored by Webroot
WHITE PAPER: The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.
Posted: 06 Aug 2012 | Published: 06 Aug 2012


The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Uncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012


Protect Sensitive Data on Laptops - Even for Disconnected Users
sponsored by Citrix Systems, Inc.
WHITE PAPER: Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.
Posted: 02 Aug 2012 | Published: 02 Aug 2012

Citrix Systems, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012


BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012


Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012


Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011


Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

151 - 175 of 328 Matches Previous Page    5 6 7 8 9 10    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement