IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
1 - 25 of 795 Matches Previous Page  |  Next Page
Not All Certificate Authorities are Created Equal
sponsored by Symantec
WHITE PAPER: Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Symantec

Q2 2016 State of the Internet Security Report | Akamai
sponsored by Akamai
WHITE PAPER: Discover how dire the world of DDoS security attacks has become and dig into the details of this multi-vector attack. Learn statistics on each industry that was attacked and get insight on how to best protect your network in the future.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Akamai

DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: See these stats and more by accessing this informative infographic and learn top attack sources and targets. Discover which industries were hit hardest by DDoS attacks in Q1 2016 and create a security strategy to avoid becoming a statistic in the next infographic.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Akamai

Insider Threat Spotlight Report
sponsored by Dell Software
WHITE PAPER: The increase in insider data theft highlights the need for better security practices. In fact, 40% of organizations don't even have the ability to detect insider threats. Access this spotlight report on insider threats to uncover more key trends that demonstrate the magnitude of this risk, and what you can do to prevent it.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Dell Software

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

Securing & enabling the Mac-empowered enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Code42

Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Deriving Value from the Technical Security Test
sponsored by SecureWorks
WHITE PAPER: Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility
sponsored by SecureWorks
WHITE PAPER: Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.
Posted: 21 Sep 2016 | Published: 31 Aug 2016

SecureWorks

Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016

Trustwave

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Best Practices for Social Media Archiving and Security
sponsored by Proofpoint, Inc.
WHITE PAPER: While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

SANS Analytics and Intelligence Survey
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: A recent SANS Security Analytics & Intelligence Survey found that organizations are still met with security challenges, like quickly responding to threats, proper implementation and use of analytics tools and more. Access the full survey report to get a more detailed view of changing security analytics trends.
Posted: 07 Sep 2016 | Published: 30 Nov 2015

LogRhythm, Inc.

Data Visualization. The What, Why and How
sponsored by SAS
WHITE PAPER: Data visualizations can help your organization tremendously when it comes to finding and eliminating cyberthreats deep within your organization. Discover how to not only detect and block attacks in minutes, but also get insight from these attack locations to better protect against emerging trends and anticipate signs of threats.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

UBM Dark Reading: Close the Detection Deficit with Security Analytics
sponsored by SAS
WHITE PAPER: Discover how to collect and correlate data from multiple sources, separate relevant data from irrelevant, and apply context to the data to extract meaningful value from data analysis. Mitigate threats faster than ever and learn the 5 essential characteristics of a security analytics solution.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

Cyberattacks that Transcend the Digital World
sponsored by OpenDNS
PODCAST: This informative podcast takes a look at the vast, interconnected systems supporting our daily life. How at risk are the industrial systems behind the light switch on your wall, the water out of your tap? Find out now.
Posted: 02 Sep 2016 | Premiered: Aug 1, 2016

OpenDNS

The Right Endpoint Protection for Your Organization
sponsored by TrendMicro
WHITE PAPER: This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Are You Fully Secure? Or Are You Using Weak Authentication Methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Breach Detection Systems Test Report
sponsored by TrendMicro
WHITE PAPER: This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

TrendMicro

What to Expect from a Multi-Factor Authentication Vendor
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multi-factor authentication vendor. Discover a strategy that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Benchmark Your Threat Detection Effectiveness
sponsored by RSA
WHITE PAPER: This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA
1 - 25 of 795 Matches Previous Page    1 2 3 4    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement