IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 670 Matches Previous Page  |  Next Page
Endpoint Visibility: Prerequisite for Today's Security
sponsored by Aruba Networks
WHITE PAPER: BYOD and IoT have made networks opaque, and gaining visibility into what's connected is paramount for security. Learn how continuous monitoring and profiling of connected devices could be your ticket to modern endpoint security.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Aruba Networks

Win the War Against Ransomware
sponsored by Commvault
EBOOK: If you're invested in winning the war against ransomware, click inside to learn 6 tips on how you can protect yourself and your data.
Posted: 23 Jun 2017 | Published: 31 Aug 2016

Commvault

Is Your Lack of Mobile Security Affecting Your Workforce Productivity?
sponsored by Dell India
WHITE PAPER: In this Forrester Research report, learn how to develop a mobile security strategy that not only delivers an improved risk profile but also makes your environment more user-friendly. Read on to implement an effective end user computing security strategy that improves workforce productivity and will enact advanced threat identification.
Posted: 19 Jun 2017 | Published: 31 Oct 2016

Dell India

Improved Security, Lower Costs: How Companies Can Benefit From SEDs
sponsored by Micron
WHITE PAPER: Delve into a flash-based SED vs. HDD-based storage comparison with acquisition costs analyzed, and attention paid to stacking up hardware- vs. software-based encryption. Read on to learn how SEDs eliminate time-consuming key management, and more.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Micron

How Flash-based SEDs Relieve Strain on IT
sponsored by Micron
WHITE PAPER: Discover how flash-based self-encrypting drives (SEDs) not only simplify the planning, operation, and expansion of storage systems, they also serve as the foundation for sustainable, secure storage. Read on to see how SEDs securely eliminate the lengthy overwriting of storage media that traditional HDDs have to undergo.
Posted: 14 Jun 2017 | Published: 14 Jun 2017

Micron

Return on Infrastructure: SSDs and SEDs Reap the "New ROI" with Superior Security
sponsored by Micron
WHITE PAPER: Learn how to use storage hardware-level encryption to improve data backup and security, in the form of SSDs and self-encrypting drives (SEDs), by downloading this resource. Read on to compare these drives to traditional HDD and software-based solutions in the areas of data security, EOL management, and DR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Micron

A 10-Year-Partnership is Putting Customer Networks on Lockdown
sponsored by GFI
CASE STUDY: In this case study, learn how FrugalBrothers Software leverages GFI software - including everything from email archiving to network protection - to offer the ultimate customer security.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

GFI

Securing Productivity in the Borderless Enterprise
sponsored by Microsoft
ANALYST REPORT: Download this resource to discover the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps.
Posted: 30 May 2017 | Published: 31 Jan 2016

Microsoft

15 Endpoint Security Suites Compared
sponsored by Symantec & Blue Coat Systems
RESEARCH CONTENT: Access Forrester's 25-criteria evaluation of endpoint security suite providers to learn market trends and uncover how 15 vendors match up.
Posted: 26 May 2017 | Published: 19 Oct 2016

Symantec & Blue Coat Systems

Enterprise Endpoint Security Benchmark Performance Report
sponsored by Symantec & Blue Coat Systems
RESOURCE: This white paper presents the results of an independent test of four leading endpoint security solutions against 17 performance metrics. Read on to get all the facts you need to determine 2017's endpoint security market leaders.
Posted: 26 May 2017 | Published: 10 Feb 2017

Symantec & Blue Coat Systems

Toolkits, Apps, & Services Used Today to Launch DDoS Attacks
sponsored by A10 Networks
WHITE PAPER: This paper delves down into what DDoS attacks are and how they work. Learn about the different types of DDoS attacks and the tools, apps, and services attackers take advantage of to get past your security measures and infect your network.
Posted: 24 May 2017 | Published: 24 May 2017

A10 Networks

Managing IoT Data: What to Consider
sponsored by Bayshore Networks
RESEARCH CONTENT: In this interview with Carrie MacGillivray, the vice president for IDC's IoT and mobility teams, learn about two key issues: How to protect IoT data, and how to transform it into meaningful insights that enhance decision-making.
Posted: 24 May 2017 | Published: 31 Dec 2016

Bayshore Networks

Harnessing Analytics For Security Investigation
sponsored by Splunk
WEBCAST: Watch this video to learn how you can harness the power of analytics software to easily detect anomalies in the endpoint, so you can prevent and mitigate advanced malware such as ransom ware.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

Planning Ahead for IoT Deployment Success: Top 5 Tips
sponsored by Aruba Networks
RESOURCE CENTER: Learn how to plan out your IoT strategy as your organization takes on smart devices, proliferating endpoints, and universal connectivity. Plus, uncover 5 best practices for successful IoT deployments with strong network security and management.
Posted: 17 May 2017 | Published: 17 May 2017

Aruba Networks

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

How to manage end point devices when moving to Windows 10
sponsored by Citrix
WEBCAST: Not every device can run Windows 10 natively, but they can run it virtually with the right desktop virtualization platform. Watch this video to learn how to deliver Windows 10 without updating end point devices or impacting server density or network bandwidth.
Posted: 09 May 2017 | Premiered: Dec 10, 2015

Citrix

Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015

Proofpoint, Inc.

Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: In "Unified Endpoint Management for Dummies" you'll learn what UEM means, and why it's so important to have in a modern mobile-enabled enterprise as well as the 5 core features of a UEM system, 10 emerging uEM trends, and more.
Posted: 02 May 2017 | Published: 02 May 2017

IBM

Build Strong Security, Starting From The Device-Level
sponsored by Lenovo
EGUIDE: In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Unified Management of Endpoints, End Users and Everything in Between
sponsored by IBM
RESOURCE: Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

Learn How You can Provide UEM Across Desktops, Laptops, Tablets, Smartphones, and IoT
sponsored by IBM
DATA SHEET: Managing the security of all your organization's devices is a tall order, but it isn't impossible. In this data sheet, learn about a system that takes a smarter approach to unified endpoint management to help you consolidate your security.
Posted: 27 Apr 2017 | Published: 31 Mar 2017

IBM

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
sponsored by BlackBerry
EGUIDE: Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.
Posted: 08 May 2017 | Published: 01 May 2017

BlackBerry
1 - 25 of 670 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement