IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security White Papers (View All Report Types)
76 - 100 of 444 Matches Previous Page  |  Next Page
Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

The Ransomware Threat - A Guide to Detecting an Attack Before it's Too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Learn all about ransomware in this white paper, including the 5 phases of a ransomware attack and the 5 steps of defending against one. Explore ways to implement various security measures, focus on detection, be ready for containment, and more.
Posted: 13 May 2016 | Published: 13 May 2016

LogRhythm, Inc.

4 Strategies for Keeping Critical Networks Secure
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn four major criteria for selecting the right long term security partner. Access now to find a security provider who can satisfy these major areas of concern and other areas of need for your organization.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This report addresses the top 3 major security challenges as your organization moves into the cloud. Gain an overview of strategies for protecting your data and network.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

Not all Next-Gen Firewalls are created equal
sponsored by Barracuda Networks
WHITE PAPER: Learn how to centrally control every aspect of your firewalls to maintain even data flow and security throughout your network. Access now learn to more about a secure communication backbone that provides all the deep packet inspection and threat mitigation you need.
Posted: 09 May 2016 | Published: 01 Apr 2016

Barracuda Networks

SimpliVity Hyperconverged Infrastructure: Lab Validation Report
sponsored by SimpliVity
WHITE PAPER: In this white paper, you will discover hyperconverged infrastructure that creates backups quickly, efficiently and securely even across data centers. Access now to learn how to backup and restore important files with just two mouse clicks.
Posted: 09 May 2016 | Published: 01 Feb 2016

SimpliVity

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

This is How We Do It: A Financial Giant's Threat Intel Success Story
sponsored by ThreatConnect
WHITE PAPER: This white paper tells you the story of a Fortune 100 services organization that integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified attacks before they occurred. Access now to learn how you can streamline and improve your threat intelligence program.
Posted: 04 May 2016 | Published: 01 Apr 2016

ThreatConnect

Client Virtualization Solutions For Government Deliver Increased Security, Mobility, and Savings
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: Find out how client virtualization can help to overcome traditional client PC security and mobility challenges and enable a more secure, mobile workforce for government agencies. You'll learn how moving sensitive data from local device storage to the data center decreases endpoint security threats.
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

Advanced Threats: Integrating a Sandbox into your Infrastructure
sponsored by Fortinet, Inc.
WHITE PAPER: Protect against advances threats with a combination of proactive mitigation, visibility and rich reporting. Learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data & Cisco
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data & Cisco

Protect your Organization Against Cybercrime in the Digital Era
sponsored by Dimension Data & Cisco
WHITE PAPER: See stats about this past year's detected cyberattacks and learn how to protect your private data against in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data & Cisco

The Advanced Threat Protection Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper displays an end-to-end modular framework for addressing cybersecurity using advanced threat protection. Access now to learn how to automate your identification, prevention and mitigation of malware, providing protection throughout your ecosystem.
Posted: 02 May 2016 | Published: 01 Feb 2016

Fortinet, Inc.

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: Your network can no longer rely on perimeters with today's cybercriminals. You must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Learn how you can effectively detect, prevent and remediate a threat before it succeeds.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

How advanced endpoint protection is stopping fraudsters in their tracks
sponsored by IBM
WHITE PAPER: This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.
Posted: 26 Apr 2016 | Published: 01 Oct 2015

IBM
76 - 100 of 444 Matches Previous Page    2 3 4 5 6 7    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement