IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
1 - 25 of 559 Matches Previous Page  | Next Page
Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

How Much Cybersecurity is Enough?
sponsored by CDW Corporation
TRANSCRIPT: In this presentation, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CDW Corporation

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

HP TippingPoint – A New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: HP TippingPoint complements anti-virus defenses with a three-prong approach that detects and disrupts the malware lifecycle.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Hewlett-Packard Company

Best Practice Guide to Mobile Device Management
sponsored by IBM
WHITE PAPER: Uncover the top ten mobile device management (MDM) best practices that will help you control the mobile devices used in your workplace, reducing risks to corporate data without jeopardizing employee productivity.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 02 Sep 2014 | Published: 16 May 2014

IBM

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

ESG Research: Security Management and Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.  This report details the current state of the market and what to expect moving forward.
Posted: 15 Aug 2014 | Published: 30 Jun 2012

Hewlett-Packard Company

The Key to Ensuring Endpoint Data Privacy in the Cloud
sponsored by Druva Software
WEBCAST: This webcast provides encryption key management schemes, designed for the cloud so your organization is ensured endpoint data privacy in the cloud. Watch now and also find out key considerations for selecting cloud backup.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Druva Software

A New Approach to Endpoint Data Protection
sponsored by Druva Software
WEBCAST: Watch this informative webcast for considerations to keep in mind when choosing a data protection solution. Also find out the benefits of an integrated solution that solves for both data protection and governance needs.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:03 EDT (05:03 GMT)

Druva Software

Securing the Internet of Things
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.
Posted: 13 Aug 2014 | Published: 12 Aug 2014

SearchSecurity.com

CIO survey All's not well at endpoints
sponsored by HP Autonomy
WHITE PAPER: This white paper explores the current endpoint security landscape and gives tips to help strike a balance between user experience for mobile workers and security requirements and control for IT.
Posted: 12 Aug 2014 | Published: 05 Mar 2014

HP Autonomy

Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos, Inc.
ANALYST REPORT: This in-depth Gartner Magic Quadrant compares 18 vendors and their EPPs. Inside, learn about each platform's strengths and cautions, and see how each matches up on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Posted: 08 Aug 2014 | Published: 08 Jan 2014

Sophos, Inc.

Best Practices for Secure Mobile Access
sponsored by Dell Software
WHITE PAPER: Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can allow your increasingly mobile workforce to become more productive and still ensure the security of your corporate data and resources.
Posted: 04 Aug 2014 | Published: 31 Dec 2013

Dell Software

Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

ComputerWeekly.com

There's Good Security and Then There's National Security
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about BlackBerry's top-tier line of defense, creating the ultimate end-to-end mobile security solution.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Computer Weekly – 29 July 2014: Going mobile in financial services
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

ComputerWeekly.com

Conquer the Endpoint Backup Challenge
sponsored by SearchDataBackup.com
EBOOK: This handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

SearchDataBackup.com

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

Simplify Your Security Management with New Data Protection Solutions
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

CDW Corporation

Next-Gen Firewall and Endpoint Protection Meet the Needs of Today's Data Centers
sponsored by CDW Corporation
WHITE PAPER: This helpful white paper introduces one renowned company's security solutions, which cover risk and compliance from end to end.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation
1 - 25 of 559 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement