IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 621 Matches Previous Page  |  Next Page
Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Best Practices for Endpoint Security Software and Devices
sponsored by BitDefender
EGUIDE: Access this expert guide for detailed advice on purchasing the right endpoint security solution, implementing endpoint security best practices, and more.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Securing Virtual Data Centers from Malware
sponsored by BitDefender
EGUIDE: Access this expert guide for tips on giving your virtual environment the level of security it needs.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

Security for Medical Equipment Makers and Healthcare Providers
sponsored by Symantec & Intuitive
WEBCAST: For healthcare organizations, securing medical devices and sensitive data on them/the network are two of the top security concerns. In this webcast, IT security experts Brian Witten of Symantec and Justin Ware of the Intuitive Technology Group discuss the security measures needed today.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Symantec & Intuitive

Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014

JAMF Software

APT Attacks and Ways to Protect Your Network
sponsored by Proofpoint, Inc.
EGUIDE: In this expert e-guide, examine several approaches to protecting your network from APT attacks, including global threat intelligence.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: Consumerization gives employees a choice, and they're choosing personal products, such as Mac laptops and iOS and Android phones. However, this opens up a world of security risks. Download this white paper to learn about managing and securing Macs and other mobile devices.
Posted: 06 Nov 2015 | Published: 28 Jan 2015

Centrify Corporation

Advanced, Efficient, and Trusted Security Practices
sponsored by Unisys
DATA SHEET: In this solution brief, you'll discover ways to address threats with new approaches that give you the security, affordability, and management control you need today. Access now and find answers to your most pertinent security questions.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

The 2015 European Mobile Workforce Report
sponsored by Dimension Data
RESEARCH CONTENT: In this report, you will address the IT challenges that introducing a mobile workforce presents. Focusing in particular on European countries, this study highlights how organizations are driving effective end-user computing growth with MDM. Read on and get an insider's look at mobile IT management and enterprise mobile app trends for 2016.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Dimension Data

Adding Macs to Your Enterprise? Start with Identity Management
sponsored by Centrify Corporation
WEBCAST: Watch this on-demand webinar to learn how to completely integrate Macs into your network environment.
Posted: 03 Nov 2015 | Premiered: May 28, 2015

Centrify Corporation

Macs in the Wild: Securing Your Mobile Workforce and Their Devices
sponsored by Centrify Corporation
WEBCAST: This webinar, presented by Jason Snell, Editor in Chief with Six Colors, and Peter Havens, Director of Product Management with Centrify, teaches you how to set up a strong defense against would be device, identity and data theft for your mobile workforce.
Posted: 03 Nov 2015 | Premiered: Sep 4, 2015

Centrify Corporation

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

5 Steps for Stronger Advanced Threat Protection
sponsored by Blue Coat Systems
WHITE PAPER: This resource outlines the 5 steps your organization can take to protect against advanced threats and strengthen your line of defenses. Learn how to take a network-based approach for 20/20 visibility into all threats, and access more security best practices.
Posted: 23 Oct 2015 | Published: 31 Dec 2014

Blue Coat Systems

Solving the App Gap to Ensure Enterprise Mobility Success
sponsored by StarMobile
WHITE PAPER: This white paper explains how to solve the "app gap" that exists between application virtualization and endpoint security in a largely BYOD world. Learn about three emerging technologies that aim to solve these mobile enterprise limitations.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014


Don't Wait Until Next Year to Build Better Defenses
sponsored by Intel Security
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Intel Security

Old PCs Put Your Business at Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how hardware-enhanced security features work alongside software solutions to protect your business from malware and secure all the important, private data on all your endpoints. You'll explore three most common ways hackers can attack you desktops and five technologies that help protect your business.
Posted: 07 Oct 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Unified Security for Today's Enterprise
sponsored by BitDefender
VIDEO: Watch this video to explore a unified approach to security that addresses the needs of virtual, physical, and mobile devices in your environment.
Posted: 06 Oct 2015 | Premiered: 03 Jun 2013


An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by Intel Security
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Intel Security

Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014

1 - 25 of 621 Matches Previous Page    1 2 3 4    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement