IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
201 - 225 of 704 Matches Previous Page  |  Next Page
Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

ComputerWeekly.com

Computer Weekly: Going mobile in financial services
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

ComputerWeekly.com

Conquer the Endpoint Backup Challenge
sponsored by SearchDataBackup.com
EBOOK: This handbook looks at why endpoint backup is so difficult, how vendors meet the challenges of backing up mobile devices, the convergence of mobile backup with file sharing and security, and choosing the right product for your needs.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

SearchDataBackup.com

Computer Weekly – 22 July 2014: Time to get serious about endpoint security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Buyers Guide: Choosing an Endpoint Protection Solution for Your Enterprise
sponsored by Sophos
WHITE PAPER: This buyers guide provides helpful charts to assist you in choosing the endpoint protection solution that will best fit the needs of your enterprise.
Posted: 03 Jul 2014 | Published: 01 Jul 2014

Sophos

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: This handbook reveals how to get ahead of enterprise desktop security threats by detailing why controlling sensitive data should take priority over efforts to chase proliferating mobile devices, why you should include security guarantees in the terms of service-level agreements, and lessons to take away from recent point-of-scale security breaches.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

SearchEnterpriseDesktop

Why Endpoint Backup Is More Critical Than Ever
sponsored by Code42
WHITE PAPER: Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.
Posted: 12 Jun 2014 | Published: 30 Apr 2014

Code42

Strengthen Enterprise Resilience with Automated Endpoint Backup
sponsored by Code42
WHITE PAPER: Access this white paper to delve into new research that highlights potential problems and gaps in organizations' approaches to endpoint backup. Inside, find out why smart IT leaders are looking for automated endpoint backup solutions.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Code42

Wherever It Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: BYOD offers a lot of benefits in terms of productivity and mobility, but it also presents a number of challenges when it comes to protection for endpoint data. This white paper highlights a cloud-powered data protection and management platform built to handle these challenges.
Posted: 11 Jun 2014 | Published: 30 May 2014

Code42

Juggling BYOD Benefits and Burdens in the Enterprise
sponsored by IBM
EBOOK: This handbook explores the positive aspects of devices in the enterprise and also presents the challenges of managing more endpoints, facing security risks and enforcing usage policies – and how to overcome them.
Posted: 05 Jun 2014 | Published: 09 Jun 2014

IBM

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

RSA Security Operations Management (SecOps) in Action
sponsored by RSA
WHITE PAPER: This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014

RSA

Understanding Microsoft Office 2013 Features, Licensing and Security
sponsored by SearchEnterpriseDesktop
EBOOK: Before moving to Microsoft Office 2013 or Office 365, IT pros should compare features, licensing schemes and application usage and be aware of emerging Office alternatives.
Posted: 19 May 2014 | Published: 22 May 2014

SearchEnterpriseDesktop

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Which Endpoint Security Service is Best? Breaking Down 5 Top Solutions
sponsored by Webroot
EGUIDE: This guide explores the management functionality of five cloud endpoint security services, along with the process needed to identify an effective anti-malware product for your clients' environments.
Posted: 01 May 2014 | Published: 01 May 2014

Webroot

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Drive More Value from Endpoint Security with Cloud-Based Anti-Virus Protection
sponsored by Webroot
WHITE PAPER: This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014

Webroot

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42
201 - 225 of 704 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement