IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 667 Matches Previous Page  |  Next Page
4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

How to manage end point devices when moving to Windows 10
sponsored by Citrix
WEBCAST: Not every device can run Windows 10 natively, but they can run it virtually with the right desktop virtualization platform. Watch this video to learn how to deliver Windows 10 without updating end point devices or impacting server density or network bandwidth.
Posted: 09 May 2017 | Premiered: Dec 10, 2015

Citrix

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
sponsored by BlackBerry
EGUIDE: Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.
Posted: 08 May 2017 | Published: 01 May 2017

BlackBerry

Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015

Proofpoint, Inc.

Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: In "Unified Endpoint Management for Dummies" you'll learn what UEM means, and why it's so important to have in a modern mobile-enabled enterprise as well as the 5 core features of a UEM system, 10 emerging uEM trends, and more.
Posted: 02 May 2017 | Published: 02 May 2017

IBM

Build Strong Security, Starting From The Device-Level
sponsored by Lenovo
EGUIDE: In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Unified Management of Endpoints, End Users and Everything in Between
sponsored by IBM
RESOURCE: Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

Learn How You can Provide UEM Across Desktops, Laptops, Tablets, Smartphones, and IoT
sponsored by IBM
DATA SHEET: Managing the security of all your organization's devices is a tall order, but it isn't impossible. In this data sheet, learn about a system that takes a smarter approach to unified endpoint management to help you consolidate your security.
Posted: 27 Apr 2017 | Published: 31 Mar 2017

IBM

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

7 Factors Driving Proper Encryption Management
sponsored by WinMagic
RESOURCE: Learn 7 key factors in encryption management that are driving ingenuity, bolstering native encryption, unifying management and transforming security.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

WinMagic

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: The business world has been increasingly mobile for years, but it hasn't been until now that cyberthreats have been aimed at mobile devices. Unified endpoint management has come to integrate augmented intelligence and cognitive technology. Access this white paper to learn how these two technologies are improving mobile security.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

Microsoft

The Security Challenge for SMBs in a Mobile World
sponsored by Microsoft
WHITE PAPER: Uncover how blending on-site security with MDM gives you a more flexible and scalable way to secure your mobile devices, data, and user identities. Read on to explore why cloud-based management of devices, information, and users is important, and ultimately, learn what benefits you can expect for your SMB.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Microsoft

Busting the Myth of the Malware “Silver Bullet”
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

McAfee, Inc.

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

How to Address IoT, Mobile, and Endpoint Security Challenges
sponsored by SOTI Inc.
WHITE PAPER: This white paper examines the security challenges of IoT and how they affect mobile strategies. Discover how to go beyond unified endpoint management (UEM), address issues of interoperability, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SOTI Inc.

Customer Success Stories: Unified Endpoint Management
sponsored by vmware airwatch
EBOOK: End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

vmware airwatch

How to Tackle Endpoint Defense Issues
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 31 Jan 2017 | Published: 27 Jan 2017

Carbon Black

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

Why AirWatch EMM is the Future of Mac Management
sponsored by vmware airwatch
WEBCAST: Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch
1 - 25 of 667 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement