IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 677 Matches Previous Page  |  Next Page
Enhancing Microsoft BitLocker for Your Enterprise
sponsored by WinMagic
WEBCAST: While BitLocker is a popular data encryption option, there are some gaps in the technology that need filling. This webcast explores how to enhance BitLocker to protect data at rest on any endpoint.
Posted: 30 Jun 2015 | Premiered: Dec 17, 2014

WinMagic

Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Enabling Secure Anywhere, Anytime Access
sponsored by HID
WHITE PAPER: This white paper examines how to enable anywhere anytime access to users while providing a simple and secure experience for multi-channel computing.
Posted: 29 Jun 2015 | Published: 06 Mar 2014

HID

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: This white paper explores how to ensure comprehensive FDE on all platforms and devices.
Posted: 29 Jun 2015 | Published: 10 Apr 2014

WinMagic

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Download and discover how hackers are using app sideloading to take advantage of your enterprise provisioning, and learn how you can manage the emerging security threats.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

SSL VPN Products in the Enterprise and Mobile Security
sponsored by Pulse Secure
EGUIDE: Access this expert eGuide to discover how SSL VPNs successfully encrypt network communications, and how to implement a solution in your business.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Pulse Secure

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Overcome Three of Today's Biggest End User Pain Points
sponsored by Dell and Microsoft
WHITE PAPER: This resource reveals 3 of the most critical IT challenges centered around end users today, providing tips on addressing these pain points without spending too much time or money doing so.
Posted: 23 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

A Closer Look at the New Enterprise Mobile Technology Stack
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this exclusive e-guide to take a look at the wide array of enterprise mobile technology available and find out how to choose the right products and services. Discover how these technologies can work together to push your organization toward mobility.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Dell, Inc. and Intel®

Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black

What’s Stopping your Breakthrough IT Performance for End User Computing?
sponsored by Dell and Microsoft
RESOURCE: This informative resource highlights a platform designed to secure, manage, and protect all the endpoint devices in your organization – including laptops. Download now to discover how this platform optimizes end-users' performance and overall enhances the end-user computing environment.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Dell and Microsoft

Top Mobile Technology Tips for CIOs
sponsored by Kony
EGUIDE: In this expert guide, you'll discover the dos and don'ts for developing purpose-built mobile applications. In addition, read on to get a closer look into the mobile technology stack, including mobile app development, enterprise mobility management, mobile backup and data protection, and more.
Posted: 16 Jun 2015 | Published: 16 Jun 2015

Kony

Moving Toward Endpoint Antivirus Alternatives And Three Ways to Prioritize Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: Access this exclusive e-guide to discover three tips that will help you prioritize the weakest point in network security – the endpoint – over perimeter defenses. Also, learn how to move toward endpoint antivirus alternatives after antimalware.
Posted: 16 Jun 2015 | Published: 16 Jun 2015


Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Endpoint Security and Best Practices for Detecting Malware
sponsored by Malwarebytes Corporation
EGUIDE: In this e-guide, you can find essential tips for adapting your endpoint security to the mobile workforce, and for protecting against hidden malware.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


A Guide to SSL-Encrypted Data: The Risks, Rewards, and How Hackers Break Through
sponsored by Blue Coat Systems
EGUIDE: Access this expert guide to learn the risks and rewards of the growing demand for end-to-end Internet encryption and discover the steps security expert Michael Gregg says enterprises should take to ensure their SSL-encrypted data remains secure.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Blue Coat Systems

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Case Study: How Varian Medical Systems Employees Became More Productive with Mobile Solutions
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Endpoint Device Backup Trends - ESG Research Brief
sponsored by Druva Software
RESOURCE: ESG"surveyed 306 IT professionals responsible for data protection technology decisions at small, midmarket, and enterprise-class organization in North America to find out more about the adoption and usage of cloud-based data protection services. Get the results now.
Posted: 05 Jun 2015 | Published: 31 Dec 2014

Druva Software

Picking A Sensible Mobile Password Policy
sponsored by SilverSky
WHITE PAPER: In this white paper, learn how to deploy a 6-point passcode policy for mobile devices that is user-friendly and highly usable, but still strong enough to protect your organization's data. Continue reading to uncover 3 reasons to never implement a password aging policy on mobile devices.
Posted: 01 Jun 2015 | Published: 20 May 2015

SilverSky

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

Securing Endpoints Against The Next Generation of Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn what you need to ensure complete endpoint security.
Posted: 28 May 2015 | Published: 28 May 2015

Trend Micro
1 - 25 of 677 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement