IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityWhite Papers (View All Report Types)
151 - 175 of 287 Matches Previous Page  | Next Page
Providing effective endpoint management at the lowest total cost
sponsored by IBM
WHITE PAPER: Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.
Posted: 23 Feb 2012 | Published: 01 Apr 2011

IBM

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Security and Data Protection with Intelligent Desktop Virtualization
sponsored by Virtual Computer, Inc.
WHITE PAPER: The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.
Posted: 24 Feb 2012 | Published: 01 Jan 2012

Virtual Computer, Inc.

Mobility Solutions
sponsored by Azzurri
WHITE PAPER: Enabling and supporting mobility can be complicated, especially when it comes to integrating it with company policy. Discover how a mobility solution can help you with all this.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

Azzurri

Security Best Practices for the Mobile Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Protecting Corporate Data in the "BYOD" Environment
sponsored by Apperian, Inc.
WHITE PAPER: While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
Posted: 10 Feb 2012 | Published: 09 Feb 2012

Apperian, Inc.

Mobile Apps in the Enterprise: Potentials and Pitfalls
sponsored by Apperian, Inc.
WHITE PAPER: Developing and deploying mobile applications is not an easy task. But learn why the benefits of mobile applications outweigh the challenges of implementing them in the enterprise.
Posted: 10 Feb 2012 | Published: 09 Feb 2012

Apperian, Inc.

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

Webroot

Ten Steps to an Enterprise Mobility Strategy
sponsored by iPass Inc.
WHITE PAPER: Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

Delivering corporate data securely on employee iPads™
sponsored by Citrix
WHITE PAPER: This white paper provides detailed insight into the latest iPad adoption trends and examines the issues that often accompany these devices from an IT perspective. Find out how the iPad differs from a traditional PC with respect to security and obtain helpful recommendations to help you balance user preferences with security and control.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

Three simple steps to better patch security
sponsored by Sophos, Inc.
WHITE PAPER: Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, uncover three best practices for improving your security and compliance with patch assessment.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

Windows 7 Migrations Provide the Ideal Time to Lock Down Endpoints
sponsored by Viewfinity
WHITE PAPER: Rather than deploying yet another desktop operating system without addressing endpoint security problems, the smarter choice may be to deal with the issue once and for all during your Windows 7 system migrations. In this resource, explore 6 frequently asked questions to help you on your way.
Posted: 30 Dec 2011 | Published: 30 Dec 2011

Viewfinity

Eight threats your antivirus won't stop
sponsored by Sophos, Inc.
WHITE PAPER: News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Sophos, Inc.

Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization
sponsored by Bradford Networks
WHITE PAPER: With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and more at-risk every day. In this paper, explore this increasing issue, and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Bradford Networks

Antivirus Protection for Virtual Desktops
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With more and more organizations implementing VDI, enterprises have to find new ways of addressing current security challenges. Discover how to secure your VDI implementation and endpoints in this white paper.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Dell, Inc. and Intel®

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Successfully Managing VDI Services with the BIG-IP System
sponsored by F5 Networks
WHITE PAPER: Learn how you can unite all the components required to make a complete and secure VDI services delivery solution in one integrated and consolidated platform.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

F5 Networks

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5
sponsored by VMware, Inc.
WHITE PAPER: This document provides a high-level summary of a reference architecture for stateless virtual desktops with VMware View™. By leveraging the tiered storage capability in VMware View to support stateless virtual desktops, organizations can lower costs by about USD $500 per desktop.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

VMware, Inc.

Virtual workspaces liberate caregivers from slow terminals reclaiming 6,250 hours a year for patient care
sponsored by Dell, Inc.
WHITE PAPER: Holyoke Medical Center needed to transition from handwritten records to a digital workflow. With a mix of aging desktops and newer endpoints, Holyoke wanted to deliver faster system access to medical staff while increasing security and mobility. Learn how Holyoke transitioned to virtual workstations for improved workflow.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell, Inc.
151 - 175 of 287 Matches Previous Page    5 6 7 8 9 10    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement