IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 796 Matches Previous Page  |  Next Page
The Executive’s Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read on to read three additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Dimension Data

Are you fully secure? Or are you still using weak authentication methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using SecurID Access to improve secure sign-ons.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Breach Detection Systems Test Report
sponsored by TrendMicro
WHITE PAPER: This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Looking for a partner to provide Multi-Factor Authentication?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Info-Tech Research Group 2015 SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover the effectiveness and simplicity SIEM can bring to threat managmenet for your organization. By integrating with other security technologies, the SIEM solution can act as a single window into the threats and possible breaches that your organization is facing. Learn how to get greater visibility into otherwise hidden threats.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

MINIMIZING THE IDENTITY ATTACK VECTOR WITH CONTINUOUS AUTHENTICATION
sponsored by RSA Softcat
WHITE PAPER: Continuous authentication could stop attacks that exploit compromised credentials and create a frictionless user experience to better protect your organization's critical information systems and the data they contain.
Posted: 22 Aug 2016 | Published: 01 Apr 2016

RSA Softcat

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection
sponsored by RSA
WHITE PAPER: Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA

Ransomware
sponsored by OpenDNS
PODCAST: This podcast looks at ransomware and how the cybercrime business operates.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

SC Mag Reviews a SIEM Platform
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.
Posted: 16 Aug 2016 | Published: 01 May 2016

LogRhythm, Inc.

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Tranforming your Security
sponsored by Fortinet, Inc.
WHITE PAPER: Fortunately, we're entering into a new era of firewall technology for your modern, borderless network. Discover how to consolidate network security across your entire threat surface, thus increasing security effectiveness and reducing complexity. Gain central visibility and control of your network, managed through a single pane of glass.
Posted: 11 Aug 2016 | Published: 01 Jul 2016

Fortinet, Inc.

A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT
sponsored by BitSight
WHITE PAPER: Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

BitSight

Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT: This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER: In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015

Vormetric

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black

Bolster Your Incident Response and Threat Detection Strategy
sponsored by Carbon Black
WHITE PAPER: In these digital times, how can you mitigate modern attacks? Discover how to centralize all endpoint activity into a single console, easily accessible to you at any time. Streamline incident response to quickly mitigate current risks and avoid future ones.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Close Security Gaps for Every Endpoint
sponsored by Carbon Black
WHITE PAPER: Learn how you can utilize both machine learning and behavioral analytics to analyze all available endpoint data, helping you stop more attacks, see more threats, and close every vulnerability.
Posted: 26 Jul 2016 | Published: 01 Jun 2016

Carbon Black
1 - 25 of 796 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement