IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
26 - 50 of 667 Matches Previous Page  |  Next Page
Simplifying Fraud Analytics: 10 Steps to Detect and Prevent Insurance Fraud
sponsored by SAS
WHITE PAPER: It's possible for companies to lose millions of dollars each year to fraud, but there is a major opportunity to use analytics tools and data to stop this bleeding. This white paper outlines 10 steps to discovering and stopping insurance fraud. Gain ideas on how you can leverage your data and business rules better to detect fraudulent activities.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: Discover why endpoint security is an essential component of a layered security strategy. Monitor and control devices to prevent significant data breaches and safeguard your reputation.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Absolute

Vendor Comparison: Endpoint Security Leaders Revealed
sponsored by Carbon Black
RESOURCE: Discover which endpoint security provider Forrester determined was the leader in their field. Learn how to replace your old antivirus solution and arm incident-response teams with advanced tools to proactively hunt down threats.
Posted: 28 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Endpoint Security Suite Evaluations
sponsored by Carbon Black
ANALYST REPORT: In Forrester's 25-criteria evaluation of endpoint security suite providers, analysts identified the 15 most significant vendors, then researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals make the right choice.
Posted: 27 Oct 2016 | Published: 19 Oct 2016

Carbon Black

Put Endpoint Security in Capable Hands
sponsored by SearchSecurity.com
EBOOK: Endpoint security threat prevention is a critical enterprise IT concern. Learn the latest on keeping endpoints secure.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

SearchSecurity.com

How to Build Your Application Security Program
sponsored by TechTarget
RESOURCE: Organizations often begin their application security program by focusing on the testing of the apps once the software has been designed and built. But many IT security pros agree – this is not the best move. Access our new e-guide for expert tips on building your enterprise application security program today.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget

Expert Guide to Email Encryption
sponsored by TechTarget
RESOURCE: In this expert guide, The Architecture of Email Encryption, learn the importance of email encryption in the enterprise and the various services and products you can leverage to achieve a confidential email system. Plus, learn how this fits nicely into your overall enterprise-wide cybersecurity plan.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

TechTarget

Ransomware - Anatomy of an attack
sponsored by Cisco Umbrella and Dimension Data
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco Umbrella and Dimension Data

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Data Visualization. The What, Why and How
sponsored by SAS
WHITE PAPER: Data visualizations can help your organization tremendously when it comes to finding and eliminating cyberthreats deep within your organization. Discover how to not only detect and block attacks in minutes, but also get insight from these attack locations to better protect against emerging trends and anticipate signs of threats.
Posted: 02 Sep 2016 | Published: 01 Aug 2016

SAS

Achieving High Fidelity Security: An EMA White Paper
sponsored by RSA
WHITE PAPER: In the security context, "high fidelity" communicates the ability to provide a richer experience to the security analyst to deliver better security outcomes. Discover the benefits of using both network and endpoint data with a strong analysis toolset to create high-fidelity security.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

RSA

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

IDC Report: Modern Defense Against Sophisticated Attacks Requires Comprehensive Endpoint Protection
sponsored by RSA
WHITE PAPER: Discover how to bolster your existing security infrastructure with tools designed to detect advanced threats from each of the 3 STAP subcategories: endpoint, boundary, and internal network analysis. Learn how to combine capabilities designed to analyze suspicious files with behavioral analysis to identify suspicious file activity early.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

RSA

How to Detect a Ransomware Attack Before it's too Late
sponsored by LogRhythm, Inc.
WHITE PAPER: Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

If A Hacker Wants Your Data, Make Sure They Really Work For It
sponsored by Carbon Black
ESSENTIAL GUIDE: This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.
Posted: 28 Jul 2016 | Published: 25 Jul 2016

Carbon Black

Cb Defense
sponsored by Carbon Black
WHITE PAPER: Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.
Posted: 27 Jul 2016 | Published: 01 Jun 2016

Carbon Black

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Protecting the Enterprise from User Security Vulnerabilities
sponsored by RES Software
RESOURCE: Understand the five most common security threats that organization face today and how to proactively remediate the risk associated with modern endpoint and user vulnerabilities.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

RES Software

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle — Reducing the Time to Discover and Recover
sponsored by Intel Security
WHITE PAPER: You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Seven Steps to Ease the Pain of Managing a SOC
sponsored by Intel Security
WHITE PAPER: Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM
26 - 50 of 667 Matches Previous Page    1 2 3 4 5    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement