IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
26 - 50 of 681 Matches Previous Page  |  Next Page
How Anti-Exploit Software Stops Malware Early
sponsored by Malwarebytes Corporation
WHITE PAPER: This brief white paper explains the concept of anti-exploit technology and discusses its capabilities.
Posted: 05 May 2015 | Published: 05 May 2015


Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015


Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The additions of HITECH and OFR extend HIPAA's reach to business associates and partners. This webcast explores the consequences of a downstream violation and the penalties you will receive if a breach occurs. View now to learn why encryption isn't enough for your security and compliance strategy.
Posted: 05 May 2015 | Premiered: Oct 22, 2014

Absolute Software

Mitigating Mobility Risks with Real-Time Contextual Data
sponsored by Aruba Networks
WHITE PAPER: Traditional endpoint security approaches won't protect users on the go, so you need to rethink your mobile strategy.  This white paper explores a coordinated defense to fill in potential security gaps bu using real-time contextual data.
Posted: 05 May 2015 | Published: 24 Mar 2015

Aruba Networks

Endpoint Security Must Get Better
sponsored by Trend Micro
WHITE PAPER: Access this white paper now to learn how unsatisfied IT leaders are simplifying endpoint security while improving protection against attacks and avoiding the costs of potential security incidents.
Posted: 05 May 2015 | Published: 05 May 2015

Trend Micro

A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER: This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014

Absolute Software

AMD and Dell cloud client-computing
sponsored by Dell, Inc.
BROCHURE: This brochure outlines how AMD Accelerated Processing Units provide Dell cloud client-computing with the flexibility to create scalable, low-cost and feature-rich products. Discover four cloud client-computing endpoints that directly benefit from AMD processors.
Posted: 04 May 2015 | Published: 31 Dec 2014

Dell, Inc.

Computer Weekly UK Election Special: Who Wins the Digital Vote?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK goes to the polls, we take an in-depth look at the political parties' manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer's guide covers collaboration software. And we analyse an emerging standard for endpoint security. Read the issue now.
Posted: 01 May 2015 | Published: 01 May 2015

ComputerWeekly.com

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014

Absolute Software

Dell Data Protection Infographic
sponsored by Dell, Inc. and Intel®
DATA SHEET: This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER: In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014

Absolute Software

Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER: This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014

Absolute Software

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc. & Intel®
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 30 Apr 2015 | Published: 30 Nov 2013

Dell, Inc. & Intel®

Protect your Employees and Data from Advanced Malware Attacks in Real-Time.
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper outlines a new approach to malware prevention that protects data and users from employee targeted attacks. Find out how this three step approach to malware prevention can give you the most advanced endpoint protection for your organization.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Dell, Inc. and Intel®

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: Ensure endpoint IT compliance processes are properly implemented and enforced by following 7 key steps, presented inside. Examine three recent data breaches directly related to stolen or misplaced devices, the consequences of them, and how to avoid these within your organization.
Posted: 29 Apr 2015 | Published: 19 Jan 2015

Absolute Software

The Importance of BYOD Security
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide highlights BYOD security strategies that can help organizations enable a truly secure BYOD environment, especially through the use of VPN and strong BYOD management policies.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Enterprise Mobility Management: Mobile Security Is Here To Stay
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide explores how enterprise mobility management should be used as a means to deliver a secure BYODs experience through the use of defined security policies, richer management suites and greater integration to enable secure mobility.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Dell Data Protection: Protected Workspace, Preventing Malware Attacks
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to learn how application virtualization can be used to create a protective barrier around applications that employees use that run untrusted content. Find out the steps involved in this process and how this can prevent attackers from ultimately gaining access to endpoints.
Posted: 28 Apr 2015 | Published: 28 Jun 2013

Dell, Inc. & Intel®

Flexible, secure solutions to keep unauthorized users out of your data
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

Dell, Inc. and Intel®

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender
26 - 50 of 681 Matches Previous Page    1 2 3 4 5    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement