IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
226 - 250 of 516 Matches Previous Page  | Next Page
Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

Hamilton Health Sciences brings care to the bedside with Citrix Receiver
sponsored by Citrix
WHITE PAPER: Healthcare traditions are changing and physicians are adopting more mobile practices. Access this informative white paper to learn more about how adopting mobile devices can improve patient care and physician productivity.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

BYOD: Device Freedom Without Compromising the IT Network
sponsored by Cisco
WHITE PAPER: Uncover the drivers, benefits, and challenges of Bring Your Own Device (BYOD) and learn how – with the right solution – you can keep your employees happy and organisation safe at the same time.
Posted: 06 Aug 2012 | Published: 15 May 2013

Cisco

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date
sponsored by Webroot
WEBCAST: Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
Posted: 30 Aug 2012 | Premiered: Sep 6, 2012

Webroot

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

Webroot

HP Mobile Application Security
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett-Packard Company

Select the right solution for endpoint management
sponsored by IBM
WHITE PAPER: Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER: Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

The Consumerization of IT: Security Challenges of the New World Order
sponsored by CA Technologies.
WHITE PAPER: Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.
Posted: 22 Aug 2012 | Published: 31 May 2012

CA Technologies.

The Expanding Network Perimeter: How to Protect it With Unified Threat Management
sponsored by Sophos, Inc.
WHITE PAPER: Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Sophos, Inc.

Webroot Secure Anywhere Business Value Assessment
sponsored by Webroot
WHITE PAPER: Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice!
Posted: 13 Aug 2012 | Published: 13 Aug 2012

Webroot

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012

Webroot

Webroot Secure Anywhere - Endpoint Protection
sponsored by Webroot
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Webroot

IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere
sponsored by Webroot
WHITE PAPER: The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Webroot

The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Uncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Zenprise

Protect Sensitive Data on Laptops - Even for Disconnected Users
sponsored by Citrix Systems, Inc.
WHITE PAPER: Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.
Posted: 02 Aug 2012 | Published: 02 Aug 2012

Citrix Systems, Inc.

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Zenprise
WHITE PAPER: With this checklist in hand, you and your organization can embrace consumerization with open arms and reap the many benefits it has to offer while ensuring you are doing the best you can to maintain the manageability and security of employee-owned devices accessing your corporate information.
Posted: 01 Aug 2012 | Published: 31 Jul 2012

Zenprise

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
sponsored by Aveksa
PRESENTATION TRANSCRIPT: Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
Posted: 24 Jul 2012 | Published: 23 Jul 2012

Aveksa

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops
sponsored by Trusteer
PRESENTATION TRANSCRIPT: Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

Trusteer
226 - 250 of 516 Matches Previous Page    8 9 10 11 12 13    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement