IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
26 - 50 of 346 Matches Previous Page  |  Next Page
17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


How Anti-Exploit Software Stops Malware Early
sponsored by Malwarebytes Corporation
WHITE PAPER: This brief white paper explains the concept of anti-exploit technology and discusses its capabilities.
Posted: 05 May 2015 | Published: 05 May 2015


Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


Mitigating Mobility Risks with Real-Time Contextual Data
sponsored by Aruba Networks
WHITE PAPER: Traditional endpoint security approaches won't protect users on the go, so you need to rethink your mobile strategy. This white paper explores a coordinated defense to fill in potential security gaps bu using real-time contextual data.
Posted: 05 May 2015 | Published: 24 Mar 2015

Aruba Networks

Endpoint Security Must Get Better
sponsored by Trend Micro
WHITE PAPER: Access this white paper now to learn how unsatisfied IT leaders are simplifying endpoint security while improving protection against attacks and avoiding the costs of potential security incidents.
Posted: 05 May 2015 | Published: 05 May 2015

Trend Micro

A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER: This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014

Absolute Software

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014

Absolute Software

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER: In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014

Absolute Software

Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014

Absolute Software

The Importance of BYOD Security
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide highlights BYOD security strategies that can help organizations enable a truly secure BYOD environment, especially through the use of VPN and strong BYOD management policies.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Enterprise Mobility Management: Mobile Security Is Here To Stay
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide explores how enterprise mobility management should be used as a means to deliver a secure BYODs experience through the use of defined security policies, richer management suites and greater integration to enable secure mobility.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Critical Factors to Endpoint Security
sponsored by Dell and Microsoft
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell and Microsoft

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Meet BYOD Challenges
sponsored by SHI International Corporation
WHITE PAPER: In this white paper, discover one potential BYOD solution that delivers an access-agnostic approach which leverages a universal security and compliancy policy across all devices, while also reducing the IT burden with an easy-to-use self-registration process.
Posted: 14 Apr 2015 | Published: 28 Mar 2014

SHI International Corporation

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®
26 - 50 of 346 Matches Previous Page    1 2 3 4 5    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement