IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
126 - 150 of 865 Matches Previous Page  |  Next Page
Virtualization Security Options: Choose Wisely
sponsored by Kaspersky Lab
WHITE PAPER: This white paper describes different virtualization security solution options - conventional agent-based, agentless, and Light Agent. Access now to learn possible scenarios for aligning the right security approach to your organization's virtual environment.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Designing an Adaptive Security Architecture for Protection From Advanced Attacks
sponsored by Intel Security
ANALYST REPORT: Let Gartner show you how to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to "always on" monitoring to better protect your network when perimeter defenses fail.
Posted: 04 May 2016 | Published: 12 Feb 2014

Intel Security

Advanced Threats: Integrating a Sandbox into your Infrastructure
sponsored by Fortinet, Inc.
WHITE PAPER: Protect against advances threats with a combination of proactive mitigation, visibility and rich reporting. Learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Protect your Organization Against Cybercrime in the Digital Era
sponsored by Dimension Data
WHITE PAPER: This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Access now and learn how to get file-level anti-malware protection, network-level protection and cloud-assisted, real time threat data and the best security approach for your organization's needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Global IT Security Risks Survey Report
sponsored by Kaspersky Lab
WHITE PAPER: This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

The Advanced Threat Protection Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper displays an end-to-end modular framework for addressing cybersecurity using advanced threat protection. Access now to learn how to automate your identification, prevention and mitigation of malware, providing protection throughout your ecosystem.
Posted: 02 May 2016 | Published: 01 Feb 2016

Fortinet, Inc.

Under Siege: The CyberSecurity Threat
sponsored by Black Duck Software
WHITE PAPER: This white paper helps you find out before you start development whether your open source code has known vulnerabilities. Access now and immediately find out when new vulnerabilities surface in your code and find out how to fix them.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

GLOBAL BANK REDUCES SECURITY RISKS & REAPS COST BENEFITS OF OPEN SOURCE
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to properly identify and implement OSS to fit your business' needs. Save time and money by automating the management of open source code from the point it enters your organization and through development.
Posted: 02 May 2016 | Published: 01 Apr 2016

Black Duck Software

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: Your network can no longer rely on perimeters with today's cybercriminals. You must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Learn how you can effectively detect, prevent and remediate a threat before it succeeds.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides key areas of inquiry for your board to consider. Access now and learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture for greater organizational operations overall.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Cyber Dwell Time and Lateral Movement
sponsored by Forcepoint
WHITE PAPER: Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Building An Effective Breach Detection And Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This Forrester Research Inc. report shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Beware the Invisible Cybercriminals: Cyberespionage and Your Business
sponsored by Kaspersky Lab
WHITE PAPER: Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don't get caught in the crossfire, read our special report and find out more on cybercriminal techniques, common exploited vulnerabilities and more.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Kaspersky Lab

Total Economic Impact of IBM Security Network Protection (XGS), Forrester Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This white paper examines the benefits you will realize by deploying next generation intrusion prevention. Access now to discover how next-gen IPS could impact your organization.
Posted: 27 Apr 2016 | Published: 01 Feb 2016

IBM

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.
Posted: 27 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Building an Enterprise Security Architecture
sponsored by Forcepoint
WHITE PAPER: This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.
Posted: 27 Apr 2016 | Published: 01 Mar 2016

Forcepoint

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premiered: 01 May 2016

SearchSecurity.com

The Human Factor Research Report 2016
sponsored by Proofpoint, Inc.
WHITE PAPER: Take an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.
126 - 150 of 865 Matches Previous Page    4 5 6 7 8 9    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement