IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
201 - 225 of 621 Matches Previous Page  |  Next Page
Handbook: Identity and Access Management
sponsored by
EBOOK: In this TechGuide, experts explore the importance of IAM technology, as well as the difficulties that companies face in effectively managing users' identities and access rights.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

Best Practices for Managing and Understanding Mobile Authentication
sponsored by
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013


Top 10 BYOD Pitfalls to Avoid
sponsored by
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

Rethink Defense-In-Depth Security Model For BYOD
sponsored by
EGUIDE: This e-guide from explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

Mobile Configuration Management Functions for Successful MDM
sponsored by
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Cloud App Success Means End-User Identity Management
sponsored by VMware, Inc.
EGUIDE: This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

VMware, Inc.

E-Guide: Rethink Defense-In-Depth Security Model For BYOD
sponsored by Intel Security
EGUIDE: This expert guide explains why endpoint defense-in-depth controls must assume the endpoint is compromised, and what paths you can take to get the most from your security system.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

Intel Security

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013


Modern Infrastructure July 2013
sponsored by
EZINE: The July issue of Modern Infrastructure covers the challenges of private cloud adoption, along with endpoint management and top-notch server and network design.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

Top 10 Features of BlackBerry Enterprise Service 10
sponsored by BlackBerry
WHITE PAPER: IT leaders need a solution that can help them manage multiple platforms, mixed ownership and higher usage. Why do so many CIOs turn to BlackBerry Enterprise Service 10 for help overseeing their mobility management needs? Find out in this white paper.
Posted: 29 Jun 2013 | Published: 29 Jun 2013


Protection for Every Enterprise: How BlackBerry 10 Security Works
sponsored by BlackBerry
WHITE PAPER: If you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.
Posted: 29 Jun 2013 | Published: 29 Jun 2013


Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013


Shift Your Thinking on Endpoint Protection
sponsored by CenterBeam
EGUIDE: In this e-guide, experts explain the state of endpoint security and why it's time to change our endpoint protection approach. View now to learn more.
Posted: 26 Jun 2013 | Published: 26 Jun 2013


File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013


Accellion raises the bar in secure cloud-based file sharing
sponsored by Accellion, Inc.
WHITE PAPER: The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
Posted: 25 Jun 2013 | Published: 04 Dec 2012

Accellion, Inc.

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013


Best Practices for Managing Endpoints in the Era of Consumerization
sponsored by SearchMobileComputing
EBOOK: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 21 Jun 2013 | Published: 21 Jun 2013


A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013


Network Evolution University: Network Security for the high-performance data center
sponsored by
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 24 Jun 2013
201 - 225 of 621 Matches Previous Page    7 8 9 10 11 12    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement