IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
201 - 225 of 760 Matches Previous Page  |  Next Page
Attacks through HTTPS can be a vulnerability for enterprises
sponsored by Blue Coat Systems
WHITE PAPER: This white paper helps you identify hidden threats to your business and what sort of encryption your network might need.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Blue Coat Systems

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Making Risk Management More Effective with Security Ratings
sponsored by BitSight
WHITE PAPER: This white paper talks about some of the security risk management approaches organizations have taken as well as new approaches to other growing problems. Access this resource now and learn to identify, quantify and mitigate risk throughout your network.
Posted: 04 Feb 2016 | Published: 30 Apr 2014


Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: Access this white paper and find out about the attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015


Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach
sponsored by BitSight
WHITE PAPER: Cyberattacks are likely to increase in the coming years and by better understanding key indicators of vulnerability to breaches, executives and directors can begin to effectively mitigate the risk of a data breach. Discover the relationship between publicly disclosed data breaches and the factors that go into an organization's security rating.
Posted: 03 Feb 2016 | Published: 30 Apr 2015


Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

A New Guide to Critical Capabilities for Mobile Data Protection Solutions
sponsored by Digital Guardian
WHITE PAPER: In this white paper you will discover solutions for MDP to defend access to storage systems found in laptops, removable media and cloud environments. You will learn how to enforce secure policies across multiple platforms at minimal costs.
Posted: 28 Jan 2016 | Published: 08 Sep 2014

Digital Guardian

Why Laptop Security Cannot Wait
sponsored by Commvault
WHITE PAPER: This white paper details the 6 critical functions that your mobile security strategy needs to efficiently secure endpoint data. View now and learn how to remotely wipe a laptop if it is lost or stolen, use geo tracking, encrypt data at the file-level and more.
Posted: 04 Dec 2015 | Published: 02 Dec 2015


Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: Access this white paper that discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: In this white paper, discover the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014


Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how you can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Using Managed Endpoint Security to Grow Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper outlines how MSPs can prevent client chaos by implementing managed endpoint security into their services.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Solarwinds N-able

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016


Advanced Threat Protection for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: View this white paper to discover how you can prevent, detect, and mitigate security risks in the healthcare industry with an advanced threat protection framework. Learn how you can experience benefits like network protection, endpoint protection, email security, and more.
Posted: 16 Feb 2016 | Published: 24 Jul 2015

Fortinet, Inc.

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016


Virtual Desktop Security: Exploring VDI Features
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell, Inc. and Intel®

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 10 Feb 2016 | Published: 11 Jan 2016

Fortinet, Inc.

Under Attack? 2016 Defenses Escape Compromise
sponsored by
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Endpoint Threat Detection Gets More Response
sponsored by LogicNow
EGUIDE: This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.
Posted: 01 Feb 2016 | Published: 25 Jan 2016


How to Predict, Detect, and Protect Against Mobile Cyber Attacks
sponsored by Skycure
WEBCAST: This webcast explores the current enterprise mobility management (EMM) strategies available as well as the benefits of implementing active threat detection to stop malware attacks as they come into the enterprise. Download now to learn how to secure all endpoints within the organizational walls and beyond.
Posted: 04 Dec 2015 | Premiered: Oct 28, 2015


What to Look for in Vulnerability Management
sponsored by
EBOOK: This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

EMM Vendor Report Card: How Do Mobility Providers Stack Up?
sponsored by VMware
WHITE PAPER: This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Endpoint Security Management: Beyond Antivirus
sponsored by
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

201 - 225 of 760 Matches Previous Page    7 8 9 10 11 12    Next Page
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement