IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 617 Matches Previous Page  |  Next Page
Case Study: Rethinking Endpoint Security
sponsored by Malwarebytes Corporation
WHITE PAPER: This case study tells of how Sun Products, a leading provider of household products, rethought its endpoint security strategy to better fight malware.
Posted: 31 Aug 2015 | Published: 31 Aug 2015


Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014

Webroot

Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014

ControlEmail

Antivirus and Antimalware Solutions for VARs
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based endpoint security as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015

Lookout

Predictive Security - Using Big Data to Unmask Mobile Threats
sponsored by Lookout
WHITE PAPER: This paper explains how predictive security leverages big data to add the layer of data and machine intelligence needed to pre-empt mobile threats before they can do harm. See examples of how predictive security was able to thwart two destructive mobile apps: MalApp.D and BadNews.
Posted: 24 Aug 2015 | Published: 05 Aug 2015

Lookout

How to use threat intelligence with SIEM successfully
sponsored by AlienVault
EGUIDE: Access this expert e-guide to discover the secrets to a successful SIEM deployment. Also, learn the advantages of using threat intelligence with SIEM – including where threat intelligence data comes from.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

AlienVault

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Don'€™t Jeopardize Security When Moving to Office 365
sponsored by McAfee, Inc.
WHITE PAPER: Access this expert white paper to discover the security risks related to the migration to Office 365 and other cloud-based applications. Also, learn how to avoid these risks with a comprehensive security solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

McAfee, Inc.

CYOD is the new BYOD – How to securely equip and manage a mobile workforce
sponsored by EE
WHITE PAPER: Access this white paper to learn why organizations are moving from BYOD initiatives to CYOD and COPE initiatives for their enterprise mobile strategy. Find out the benefits of each and discover 3 factors to consider before implementing CYOD or COPE in your organization.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

EE

Cheat sheet: Your guide to mobile device management (MDM)
sponsored by EE
WHITE PAPER: Access this white paper to learn how mobile device management (MDM) platforms balance the mobility users want with the security and control IT needs. Find out capabilities of MDM platforms and what steps you should take before implementing one in your own organization.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

EE

The Evolution of Ransomware
sponsored by Symantec Corporation
WHITE PAPER: The white paper gives you an extensive look at the origins, development, and functioning of ransomware.
Posted: 14 Aug 2015 | Published: 06 Aug 2015

Symantec Corporation

Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 13 Aug 2015 | Published: 25 Feb 2015

IBM

The Productivity Transformation: Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 12 Aug 2015 | Published: 15 Jul 2015

IBM

Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.
Posted: 12 Aug 2015 | Published: 13 Jul 2015

IBM

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This white paper describes what users look for in an EFSS solution, including the top five corporate EFSS security requirements. Read on to learn about a solution that enables organizations to keep employees productive while meeting IT security and compliance requirements.
Posted: 11 Aug 2015 | Published: 29 May 2015

Acronis

Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

Absolute

Malware Defense: How to Detect and Mitigate Advance Evasion Techniques
sponsored by CrowdStrike
EGUIDE: In this e-guide, a security expert explores the evasion techniques used by advanced malware and explains how to detect and mitigate these threats.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Endpoint Threat Detection Gets More Response
sponsored by CrowdStrike
EGUIDE: This expert guide discusses the importance of including detection alongside monitoring and remediation capabilities in your endpoint security strategy.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

CrowdStrike

Developing Strategic Mobile Management & Security
sponsored by Absolute
WHITE PAPER: This Gartner report can help you develop a mobile endpoint strategy that is streamlined, efficient, and secure.
Posted: 04 Aug 2015 | Published: 25 Apr 2014

Absolute

Security Services for Defeating Sophisticated Attacks
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses what you can achieve with the right people looking out for your security.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

What is Endpoint Security? What Benefits Does it Offer?
sponsored by CrowdStrike
EGUIDE: This expert e-guide discusses approaches to secure every endpoint in your organization. Download now to learn about endpoint protection software and explore nine capabilities most often provided by this software.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

Case Study: Health Insurer Innovates its Endpoint Security
sponsored by CrowdStrike
VIDEO: This brief video describes how a major healthcare provider updated its security with a next generation endpoint protection platform.
Posted: 03 Aug 2015 | Premiered: 31 May 2015

CrowdStrike
1 - 25 of 617 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement