IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 706 Matches Previous Page  |  Next Page
The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Broadcast Media Case Study
sponsored by enSilo
CASE STUDY: Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Aziz Bank of Afghanistan Reduces the Risk of Cyber Threats Using Seqrite Endpoint Security
sponsored by Seqrite
CASE STUDY: Many customers rely on the Azizi Bank's online portal for service requests, but low internet bandwidth was affecting the bank's operation and business behavior. Inside this case study, learn how this bank achieved security through endpoint and firewall protection to monitor and control web traffic.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Seqrite

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Endpoint Security and HIPAA Compliance
sponsored by enSilo
WHITE PAPER: A common requirement in virtually all regulatory compliance objectives and defense in depth strategies is to provide endpoint protection against malware and zero-day threats. Read this white paper to uncover a strategic approach to endpoint security while maintaining HIPAA compliance.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Key Data Protection Requirements of GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: According to the Center for Internet Security (CIS), most successful attacks exploit poor cyber hygiene. To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

How to Create, Deploy, and Operate Secure IoT Applications
sponsored by Telit
WHITE PAPER: According to Gartner, spending on IoT security is expected to reach $547 million in 2018. In this white paper, gain valuable insights on how to create, deploy and operate end-to-end security to help identify and prevent hackers from getting your organizations data through IoT devices.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Telit

Case Study: How to Secure Endpoints even at Low Internet Bandwidth
sponsored by Seqrite
CASE STUDY: With the evolving complexities and volume of threats, Posco wanted a one-stop security tool that could help secure their network even at low Internet bandwidth. Learn about why Posco choose an endpoint security tool to overcome this challenge.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Seqrite

Employing Machine Learning in a Security Environment
sponsored by LogRhythm, Inc.
WHITE PAPER: As security vendors look for ways to improve their security posture and fight against advancing cyberattacks, there has been a great deal of interest in machine learning and AI. This white paper offers insight into applying machine learning and AI to your current security environment to improve your ability to swiftly detect and respond to threats.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

How Do You Know If Your Last Security Incident Is Fully Addressed?
sponsored by Tanium
RESOURCE: According to the Ponemon Institute's Cost of a Data Breach Study, it takes organizations an average of 191 days to detect a breach. Once you have dealt with a breach, how do you know it is fully addressed? This infographic reveals staggering statistics regarding cyberattacks, breach detection, and remediation.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Tanium

2018 Foresight Report
sponsored by Booz Allen Hamilton
RESOURCE: According to Cyber4Sight's predictions, cyberattacks are leading to a greater worldwide economic cost than ever before and will likely have a profound shift in politics. Take a look at this report to uncover damaging cybercrime trends that took place in 2017 and insightful predictions for 2018.
Posted: 09 Jan 2018 | Published: 31 Dec 2017

Booz Allen Hamilton

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

7 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: This white paper offers 7 key questions to ask when selecting an incident response service provider, to help you evaluate vendors based on your organization's needs.
Posted: 20 Dec 2017 | Published: 20 Dec 2017

Dell SecureWorks

The "Patient Zero" Problem and the Need for Modern Endpoint Protection
sponsored by Palo Alto Networks
RESEARCH CONTENT: The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.
Posted: 30 Nov 2017 | Published: 30 Jun 2017

Palo Alto Networks

Mobile Management Platform for Apple iOS
sponsored by SOTI Inc.
WHITE PAPER: It can be challenging for many IT departments to securely manage, and deploy mobile devices across the enterprise. Download this white paper to discover a mobile device management platform that simplifies and secures the management of iOS devices.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

SOTI Inc.

Mobile Management for Android Devices
sponsored by SOTI Inc.
WHITE PAPER: Download this white paper to discover a mobile device management platform with Android management capabilities that ensures devices are secured, managed and supported, regardless of OS version or device manufacturer.
Posted: 30 Nov 2017 | Published: 30 Nov 2017

SOTI Inc.

Are you managing the mobility tsunami or struggling in the next technology tidal wave?
sponsored by SOTI Inc.
WHITE PAPER: Download this white paper to uncover a general, regional and corporate view of enterprise mobility in terms of relevance, investment priorities, compliance, reliability and more.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

SOTI Inc.

Servers, Servers, Everywhere: How the Hybrid Cloud Changes the Game for Security
sponsored by TrendMicro
WHITE PAPER: With the vast shift to the cloud, securing workloads in multiple locations has become more complex than ever before. Access this white paper to gain valuable insights into the security challenges of the hybrid cloud and how you can overcome these challenges.
Posted: 29 Nov 2017 | Published: 31 Mar 2017

TrendMicro

A Matchmaker's Guide to UBA Solutions
sponsored by Rapid 7
WHITE PAPER: Gartner predicts that by 2020, less than 5 stand-alone user behavior analytics (UBA) solutions will remain in the market, with most vendors focusing on specific use cases and outcomes. This paper offers 13 questions to help you evaluate the right UBA strategy and confirm your company's protection far into the future.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

Rapid 7

Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

Peak Retail Season Threats to Look for
sponsored by Booz Allen Hamilton
WHITE PAPER: During the holiday season, cybercriminals prepare attacks on retailers everywhere in the hopes the retailers will pay ransom to ensure their websites are running smoothly for peak holiday hours. This threat report reveals the top threats ranked by security and likelihood that websites will face during peak retail season.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Booz Allen Hamilton

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM
1 - 25 of 706 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement