IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 693 Matches Previous Page  |  Next Page
5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape. Learn what should be covered, how, and common issues associated with choosing the one right for you.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

Adapt Your Infosec Program for Advanced Threats
sponsored by TechTarget
EGUIDE: In our just-launched guide, How to Evolve Your Infosec Program for Emerging Threats, security expert Nick Lewis explains how to update and evolve these programs, and then reveals what enterprises need to know about APT-style attacks.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

TechTarget

How to Address IoT, Mobile, and Endpoint Security Challenges
sponsored by SOTI Inc.
WHITE PAPER: This white paper examines the security challenges of IoT and how they affect mobile strategies. Discover how to go beyond unified endpoint management (UEM), address issues of interoperability, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

Endpoint Security for the Empowered Enterprise
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This resource examines endpoint protection features that improve system performance and user productivity. Uncover Dell's Endpoint Security Suite Enterprise, how it supports encryption and advanced authentication, and the technical specifications required.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell, Inc. & Intel®

Why AirWatch EMM is the Future of Mac Management
sponsored by vmware airwatch
WEBCAST: Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Securing Your Microsoft Environment
sponsored by Palo Alto Networks
WHITE PAPER: The challenge your organization faces is how to best protect your infrastructure from cyberattacks. Discover ways to adopt a prevention-first security posture that protects the network and digital assets.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks

UEM is the Next Step in the Evolution of Device Management
sponsored by vmware airwatch
WHITE PAPER: Read this white paper to uncover AirWatch's leading unified endpoint management (UEM) approach. Find out how it enables organizations to take a consistent approach to endpoint security and management across a plethora of devices, apps, and deployments.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

A First Look at the Future of Windows Management and Security
sponsored by vmware airwatch
WEBCAST: Watch this 3 minute webinar to learn how unified endpoint management technologies come together to lower the cost of managing your Windows deployments, secure endpoints and data on any network across any application, and deliver peak user experience across any device.
Posted: 16 Dec 2016 | Premiered: Dec 16, 2016

vmware airwatch

The Foundation of Next-Gen Enterprise Security is Embedded in your Endpoints
sponsored by Absolute
WHITE PAPER: As the lines between corporate and personal have blurred, or even blended altogether, the enterprise security team has less and less true control over all of the endpoints being used by employees. Learn how to activate embedded security in your endpoints to ensure complete protection of your valuable assets.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Redefining Next-generation Endpoint Security Solutions
sponsored by Intel Security
WHITE PAPER: Discover how to streamline security operations using next-generation endpoint security. Learn about new tools built for centralization, consolidation and integration that can help you prevent advanced malware from infecting your endpoints and crippling your organization.
Posted: 09 Dec 2016 | Published: 01 Oct 2016

Intel Security

Ransomware: A Hostage Rescue Manual
sponsored by KnowBe4
WHITE PAPER: Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Top Benefits of Integrated Endpoint Protection
sponsored by TrendMicro
EGUIDE: When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software and find out for yourself.
Posted: 11 Nov 2016 | Published: 10 Nov 2016

TrendMicro

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Simplifying Fraud Analytics: 10 Steps to Detect and Prevent Insurance Fraud
sponsored by SAS
WHITE PAPER: This white paper outlines 10 steps that offer you the best chance of discovering and stopping fraud in your business. Learn fraud prevention tactics such as preparing your company for big data management, visualizing your data, creating a rules-based system to detect known types of fraud, and more.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Endpoint Security Suite Evaluations
sponsored by Carbon Black
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 27 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Put Endpoint Security in Capable Hands
sponsored by SearchSecurity.com
EBOOK: Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

SearchSecurity.com

How to Build Your Application Security Program
sponsored by TechTarget
RESOURCE: Organizations often begin their application security program by focusing on the testing of the apps once the software has been designed and built. But many IT security pros agree – this is not the best move. Access our new e-guide for expert tips on building your enterprise application security program today.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget

Managed Security Services Provider – Evaluation Checklist
sponsored by Trustwave
RESOURCE: Evaluate your next MSSP with this simple to use checklist. With it, you'll know important questions ask during the decision process and be able to compare two potential MSSP's against each other quickly and easily.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

The Three Essential Elements of Next-Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: With an overabundance of security solutions being touted as "next gen," how do you know what really is an innovative endpoint protection product? Discover an explanation of the essential elements of next-gen endpoint protection, a list of the top questions to ask potential vendors, and more.
Posted: 07 Oct 2016 | Published: 07 Oct 2016

CrowdStrike
1 - 25 of 693 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement