IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 733 Matches Previous Page  |  Next Page
Cybersecurity: For Defenders, It's About Time
sponsored by McAfee, Inc.
WHITE PAPER: In multiple areas of cyber security, time is working in favor of the attackers. This Aberdeen Group white paper provides 4 examples of how recapturing an advantage of time can help defenders to reduce their risk.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Mastering the Endpoint: Organizations Find Value in Integrated Suites
sponsored by McAfee, Inc.
WHITE PAPER: According to Forrester, more than 2/3s of enterprises have had their organization's sensitive data compromised in the past year. This Forrester white paper provides insight into a survey compiled with common tools and strategies for managing endpoint security as well as the efficacy of the strategies.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Magic Quadrant for Enterprise Data Loss Prevention
sponsored by McAfee, Inc.
WHITE PAPER: According to Gartner, By 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's DLP products as well as, a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Six Steps to Enabling the Mobile Worker
sponsored by Citrix
WHITE PAPER: Employees demand easy access to apps and data in a consistent environment, on a variety of devices. But it can be difficult for IT to ensure constant data protection, privacy, and compliance across devices. Download this white paper to discover six steps that can lead to a successful mobility initiative.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

5 Ways Virtualization Enhances Security and Productivity
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how virtualization can result in significant security and productivity improvements and cost savings. You'll find five use cases that illustrate how virtualization can make browser apps more secure, accelerate Windows migration, improve efficiency, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

Embracing the Digital Workplace with Unified Endpoint Management (UEM)
sponsored by MicroFocus
WHITE PAPER: Today's workers demand access to data and apps from a variety of devices. But how can your organization meet these demands without compromising security and compliance needs? Download this white paper to discover how the right unified endpoint management (UEM) technology can help.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

MicroFocus

The Time to Refresh Your Business Tech is Now
sponsored by Dell EMC
RESOURCE CENTER: Download this article to find out how investing in modern business technology can help your organisation stay up to speed (and gain competitive advantage) in the midst of digital transformation.  
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Dell EMC

Top 4 Ways to Strengthen Security with PC Lifecycle Management
sponsored by Dell EMC
RESOURCE CENTER: Endpoints remain the number one source for security breaches, which is why it's more important than ever to reduce risk by staying up to date with the latest security advancements. Download this resource to discover how PC lifecycle management can reduce security risks for your organisation in 4 key ways.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Dell EMC

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

Protecting Endpoints Everywhere
sponsored by Cisco Umbrella
EBOOK: In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

Peak Retail Season Threats to Look for
sponsored by Booz Allen Hamilton
WHITE PAPER: During the holiday season, cybercriminals prepare attacks on retailers everywhere in the hopes the retailers will pay ransom to ensure their websites are running smoothly for peak holiday hours. This threat report reveals the top threats ranked by security and likelihood that websites will face during peak retail season.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Booz Allen Hamilton

How to Embrace a Zero Day Compliance Model for Windows 10 Patch Management
sponsored by VMware
WHITE PAPER: Windows 10 is becoming a fact of life for most enterprises, and is bringing a new approach to patch delivery. Access this report to learn about the challenges you will face with the new deployment model for Windows 10 patches and how to manage them.
Posted: 02 Nov 2017 | Published: 31 Oct 2017

VMware

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Find and eliminate security blind spots with always-on vulnerability management
sponsored by Tenable, Inc.
WHITE PAPER: Explore this Frost & Sullivan white paper to learn more about vulnerability management: implementation, endpoints, user behavior, and more. Inside, also discover why one vulnerability management vendor received Frost & Sullivan's 2017 Visionary Innovation Leadership Award.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Tenable, Inc.

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

Explore the latest enterprise mobile security technology
sponsored by SearchMobileComputing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

SearchMobileComputing

KuppingerCole Report Leadership Compass
sponsored by CyberArk Software, Inc and KuppingerCole
WHITE PAPER: Privilege management is among the most relevant areas of IAM and cybersecurity, given that privileged users are a primary target of attackers. Explore this 55 page market report to learn more about privilege management and how you can protect your enterprise to the fullest extent against attackers.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

CyberArk Software, Inc and KuppingerCole

Absolute Persistence
sponsored by Absolute
WHITE PAPER: Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute

How to Close Security Gaps to Stop Ransomware and other Threats
sponsored by Fortinet, Inc.
EBOOK: In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

Advantages of a Fabric vs. Platform Approach to Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: It is challenging to know which strategy is best for your enterprise protection. This white paper explores the differences between a fabric and a platform approach to your security framework, and reveals how you can protect your enterprise from security threats.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Fortinet, Inc.

The State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

The 4 Critical Areas You Must Address for Cloud Security
sponsored by Symantec
WHITE PAPER: As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec

Cloud-based Apps: For Better or Worse
sponsored by Verizon
WHITE PAPER: In this white paper, gain a stronger understanding of the questions you should be asking when implementing SaaS, as more business apps move to the cloud.
Posted: 31 Oct 2017 | Published: 28 Feb 2017

Verizon
1 - 25 of 733 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement