IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
26 - 50 of 332 Matches Previous Page  |  Next Page
Mitigating Mobility Risks with Real-Time Contextual Data
sponsored by Aruba Networks
WHITE PAPER: Traditional endpoint security approaches won't protect users on the go, so you need to rethink your mobile strategy. This white paper explores a coordinated defense to fill in potential security gaps bu using real-time contextual data.
Posted: 05 May 2015 | Published: 24 Mar 2015

Aruba Networks

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Critical Factors to Endpoint Security
sponsored by Dell and Microsoft
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell and Microsoft

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Tips for your move to VMware Horizon View
sponsored by VMware
WHITE PAPER: This informative resource highlights a technology that helps IT to tackle challenges from enterprise mobility by moving desktop assets into the data center, where IT staff can securely manage and deliver them to end users across any device. Find out 10 tips as you plan your move to virtual desktop infrastructure (VDI).
Posted: 17 Mar 2015 | Published: 31 Dec 2013

VMware

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

The VMware View Business Process Desktop
sponsored by VMware
WHITE PAPER: Inside this brief white paper, discover a technology that enables customers looking to outsource or offshore business processes to effectively scale their business on demand, streamline and centralize desktop management and provide end users with a secure desktop experience across the LAN and WAN.
Posted: 16 Mar 2015 | Published: 31 Dec 2012

VMware

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

What You Should Know About File Sync-And-Share Workloads
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look at how endpoint security and data backup should be handled with the rise of enterprise mobility and BYOD. Read on to learn more.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Commvault

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Stepping Up the Battle against Advanced Threats
sponsored by IBM
WHITE PAPER: This white paper discusses the different ways cybercriminals target end users, and the main reasons why enterprises have failed to protect against advanced threats.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

The Rising Threat of Corporate Cybercrime
sponsored by IBM
WHITE PAPER: This white paper takes you through different kinds of corporate cybercrime and how endpoint application protection can combat them.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

IBM

Strengthening networks and endpoints with behavior-based protection
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

A Revolutionary Platform Enabling End User Specific Solutions
sponsored by Compressus
WHITE PAPER: Access this collection of short white paper for an explanation of the challenges facing healthcare leaders and how a revolutionary platform can enable their ability to prepare for the future.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Compressus

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company
26 - 50 of 332 Matches Previous Page    1 2 3 4 5    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement