IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
51 - 75 of 532 Matches Previous Page  | Next Page
Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER: This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Integrated IT Security for Midsize Businesses
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Understanding Big Data and Security
sponsored by Hewlett-Packard Limited
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Limited

Understand and Counter Insider Threats with Behavioral Analytics
sponsored by Hewlett-Packard Company
WEBCAST: This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.
Posted: 25 Feb 2014 | Premiered: Nov 14, 2013

Hewlett-Packard Company

FireEye Advanced Cyber Attack Landscape Report
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape across the globe and how your business may be affected depending on industry and location.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

FireEye

The 2014 Endpoint Security Buyers Guide
sponsored by Lumension
WHITE PAPER: This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology.
Posted: 21 Feb 2014 | Published: 16 Aug 2013

Lumension

Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain
sponsored by Lumension
WHITE PAPER: This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more.
Posted: 21 Feb 2014 | Published: 04 Feb 2013

Lumension

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

Conquer Endpoint Security Challenges with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: Explore this exclusive report to find out how IBM Endpoint Manager responds to today's endpoint challenges.
Posted: 14 Feb 2014 | Published: 31 Jan 2012

IBM

Enterprise Endpoint Backup Solutions Get a Makeover
sponsored by Druva Software
WHITE PAPER: Access this report to learn why endpoint backup must evolve to meet the needs of the mobile workforce.
Posted: 11 Feb 2014 | Published: 24 Oct 2013

Druva Software

Ocean Media Secures Remote Access with Celestix HOTPin
sponsored by Celestix Networks
WHITE PAPER: This guide explores how one company successfully implemented a remote access strategy, remained compliant with security regulations, and enhanced end-user performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Celestix Networks

Q&A on Protecting and Enabling the Anytime, Anywhere Worker
sponsored by CommVault Systems, Inc.
WEBCAST: Watch this informative webcast to find out what Rachel Dines recommends for protection management.
Posted: 03 Feb 2014 | Premiered: Oct 10, 2013

CommVault Systems, Inc.

One Tool to Manage Endpoint Security Across Entire Organization
sponsored by IBM
WHITE PAPER: This guide explores how an efficient endpoint management tool can enhance end-user experience, enhance productivity, reduce risk and increase visibility.
Posted: 03 Feb 2014 | Published: 31 Mar 2013

IBM

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 31 Jan 2014 | Published: 30 Sep 2013

IBM

Whitepaper: Four customers who never have to refresh their PCs again
sponsored by Citrix
WHITE PAPER: This whitepaper will help you learn more about four organizations that never have to refresh their PCs again, and can now ensure a fully up-to-date experience for employees on any type of endpoint – including low-cost thin clients.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Citrix

2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST: This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Lumension

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
Posted: 03 Feb 2014 | Published: 31 May 2013

IBM

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Endpoint Security IT Decision Center Handbook 3
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Endpoint Security Best Practices
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Symantec Corporation

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com
51 - 75 of 532 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement