IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
176 - 200 of 590 Matches Previous Page  | Next Page
Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

Mobile Device Data Protection: Key Findings and Players in the Market
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

SearchSecurity.com

Network Security Visibility and Analysis Technical Guide
sponsored by SearchSecurity.com
EZINE: This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.
Posted: 11 Jun 2013 | Published: 10 Jun 2013

SearchSecurity.com

Three Key Steps to Achieving Mobile Security Harmony
sponsored by IBM
WHITE PAPER: In order to protect sensitive data, you'll need to take special care to ensure that you are implementing the robust controls needed to prevent both unintentional loss and malicious theft. Read this informative whitepaper in order to learn how to choose and implement data security controls effectively.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

IBM

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

CenterBeam

State of the Art on Managing Endpoints
sponsored by SearchConsumerization.com
EBOOK: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 21 Jun 2013 | Published: 21 Jun 2013


A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Network Evolution University: Network Security for the high-performance data center
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 24 Jun 2013

SearchNetworking.com

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013

Citrix

Security University: Data Loss Prevention
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Dive into this SearchSecurity.com classroom to learn the difference between suite and point product approaches. Find out how to assess what to focus on within your own organization, and learn the pitfalls in DLP implementation.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013

SearchSecurity.com

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Mobile Device Management Live Chat
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

SearchSecurity.com

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by Dell, Inc.
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

Dell, Inc.

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by Webroot
WHITE PAPER: This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013

Webroot

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by McAfee, Inc.
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER: This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.
176 - 200 of 590 Matches Previous Page    6 7 8 9 10 11    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement