IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
226 - 250 of 760 Matches Previous Page  |  Next Page
The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Comprehensive Data Protection Against Insider & Outsider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explores how you can implement data protection that travels with your data regardless of location or device.
Posted: 14 Apr 2015 | Published: 25 Mar 2015

Digital Guardian

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper focuses on one of the most prevalent form of cybercrime – online banking fraud. Learn the steps cyber criminals take to gain access to your personal information.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

Simply Virtual Desktop Use and Management with and All-in-One Thin Client
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this whitepaper to learn about a new all-in-one (AiO) thin client that is powerful, yet stylish, and boasts one of the most secure, high performance thin client operating systems for simplified management.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Dell, Inc. and Intel®

Why Companies Want 'Thin' (not 'Fat') Clients
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This updated analysis takes a critical look at thin client computing, examining this technology's major benefits such as simplified management, safer security, greater storage, and its enhanced adaptability for literally any type of business.
Posted: 09 Dec 2014 | Published: 30 Apr 2014

Dell, Inc. and Intel®

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Proactive Responses to Today's Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This white paper helps you maintain continuous compliance and shows you how to quickly respond to incidents to mitigate their impact. Access now to learn how you can gain leading analytics capabilities to provide insight that'll harden your infrastructure.
Posted: 05 Nov 2014 | Published: 15 Oct 2014

IBM

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper gives you a detailed look at how to stop the chain of attack in a data breach.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by Symantec Corporation
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

Symantec Corporation

Desktop management tools still an IT staple
sponsored by SearchEnterpriseDesktop
EBOOK: Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

SearchEnterpriseDesktop

What You Should Know About File Sync-And-Share Workloads
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look at how endpoint security and data backup should be handled with the rise of enterprise mobility and BYOD. Read on to learn more.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Commvault

Sysinternals Still Essential for Desktop Troubleshooting
sponsored by SearchEnterpriseDesktop
EBOOK: The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchEnterpriseDesktop

IBM Endpoint Manager for Lifecycle Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint and lifecycle management solution that provides an accurate and comprehensive single source of truth for managing all of your endpoints in a single-server.
Posted: 29 Jan 2015 | Published: 13 Oct 2014

IBM

Mobility Management Evolves Into BYOD and Beyond
sponsored by SearchEnterpriseDesktop
EBOOK: Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

SearchEnterpriseDesktop

Endpoint Data Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Commvault

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by Dell
EBOOK: Learn how to craft a sound enterprise desktop security strategy with the tips in this expert ezine from TechTarget.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Dell

Exclusive CISSP Study Guide
sponsored by ComputerWeekly.com
RESOURCE: Obtaining your CISSP certification is globally recognized as a standard of achievement for security professionals, but earning and maintaining your status takes work. Gain access to our helpful CISSP guide when you complete our brief Endpoint Security Survey.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

ComputerWeekly.com

Tech Tips: Successful Deployment of VMware Horizon (with View) and VMware Mirage
sponsored by VMware
WHITE PAPER: This white paper outlines the 10 tips to consider when planning for a virtual desktop infrastructure (VDI) or physical endpoint deployment. Read on to discover how two leading products offer solutions for both virtualization of end-users desktops and new/existing physical or virtual devices.
Posted: 17 Oct 2014 | Published: 31 Jul 2014

VMware

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise
226 - 250 of 760 Matches Previous Page    8 9 10 11 12 13    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement