IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
51 - 75 of 823 Matches Previous Page  |  Next Page
SimpliVity Hyperconverged Infrastructure: Lab Validation Report
sponsored by SimpliVity
WHITE PAPER: In this white paper, you will discover hyperconverged infrastructure that creates backups quickly, efficiently and securely even across data centers. Access now to learn how to backup and restore important files with just two mouse clicks.
Posted: 09 May 2016 | Published: 01 Feb 2016

SimpliVity

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Operationalizing Threat Intelligence
sponsored by Intel Security
PRODUCT OVERVIEW: Learn how to leverage a collaborative platform for operationalizing threat intelligence—including real-time sharing of threat information across the IT infrastructure and delivery of adaptive protection. Discover how to interrupt the cyberattack chain and arming your enterprise with the latest cyberthreat intelligence insights.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Enhancing ATA Remediation: Monitor Continuously, Respond Swiftly
sponsored by Intel Security
PRODUCT OVERVIEW: Discover why endpoint detection and response (EDR) should be an indispensable supplement to your current defenses. Learn how to transform your team from an incident response mentality to one of continuous monitoring and equip yourself against zero-day and advanced targeted attacks.
Posted: 09 May 2016 | Published: 31 Dec 2015

Intel Security

Secure Pipes: Changing the Expectation of Your Internet Service Providers
sponsored by Level 3 Communications, Inc.
ANALYST BRIEF: The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century.
Posted: 09 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

McAfee Labs Threats Report
sponsored by Intel Security
WHITE PAPER: Access this in-depth report from McAfee Labs to learn more about the rise of cyber threat intelligence—including findings from a recent survey of IT professionals—as well as what you need to know about the increasingly prevalent threat of Adwind Java-based malware.
Posted: 09 May 2016 | Published: 31 Mar 2016

Intel Security

Cost of Data Breach – Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: This report examines two factors that affect the financial consequences of a data breach. The first is executive involvement security strategy and response to data breaches. The second is the purchase of cyber insurance to mitigate the cost of a data breach. Access now to learn how to best mitigate cyber breaches and protect reputation.
Posted: 06 May 2016 | Published: 01 May 2015

IBM

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover why piecemeal endpoint defenses are not sufficient to protect against today's threat vectors as we take you inside the mind of an attacker to help you bolster your defenses. Read on to learn six ways to think like a hacker and why new threats require more than strategies and tools to keep the bad guys at bay.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Data Breach Digest 2016: 500 cybersecurity incidents investigated
sponsored by Verizon
WHITE PAPER: 84-page Data Breach Digest shines a light on some of the most prevalent incident scenarios to show you what you can do in the face of disaster. Access now to learn how you can best mitigate threats in the future.
Posted: 05 May 2016 | Published: 01 Apr 2016

Verizon

What is Advanced Hybrid Security?
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Are you prepared for complex attacks on your network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Posted: 05 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Discovering Security Analytics Use Cases
sponsored by Prelert
RESOURCE: In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.
Posted: 05 May 2016 | Published: 05 May 2016

Prelert

Security Analysis: Mobile Dating Apps Vulnerabilities and Risks to Enterprises
sponsored by IBM
WHITE PAPER: Why should you be paying attention to personal apps used on corporate devices? Get an understanding of which applications are vulnerable to attacks and take action to blacklist at-risk applications from running on a device with corporate data.
Posted: 04 May 2016 | Published: 01 Feb 2015

IBM

This is How We Do It: A Financial Giant's Threat Intel Success Story
sponsored by ThreatConnect
WHITE PAPER: This white paper tells you the story of a Fortune 100 services organization that integrated its security infrastructure, increased the efficiency of its cybersecurity team, and thereby identified attacks before they occurred. Access now to learn how you can streamline and improve your threat intelligence program.
Posted: 04 May 2016 | Published: 01 Apr 2016

ThreatConnect

ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Client Virtualization Solutions For Government Deliver Increased Security, Mobility, and Savings
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: Find out how client virtualization can help to overcome traditional client PC security and mobility challenges and enable a more secure, mobile workforce for government agencies. You'll learn how moving sensitive data from local device storage to the data center decreases endpoint security threats.
Posted: 04 May 2016 | Published: 04 May 2016

Dell, Inc., Intel and VMware

The Threat Landscape
sponsored by Kaspersky Lab
WHITE PAPER: Download the latest from Kaspersky Lab's security experts, and you will find updates on common vulnerabilities and exploits, insights into the current state of threats, and tips to improve employee security awareness.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Could Your Business Survive a Cryptor?
sponsored by Kaspersky Lab
WHITE PAPER: Learn how you can prevent such an attack and protect your business.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Debunking the Top 5 Security Implementation Myths
sponsored by Kaspersky Lab
WHITE PAPER: This e-book aims to show you that replacing your old cybersecurity can be quick and painless. Access now to learn 5 myths about implementing IT security.
Posted: 04 May 2016 | Published: 01 Dec 2015

Kaspersky Lab

Virtualization Security Options: Choose Wisely
sponsored by Kaspersky Lab
WHITE PAPER: This white paper describes different virtualization security solution options - conventional agent-based, agentless, and Light Agent. Access now to learn possible scenarios for aligning the right security approach to your organization's virtual environment.
Posted: 04 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Designing an Adaptive Security Architecture for Protection From Advanced Attacks
sponsored by Intel Security
ANALYST REPORT: Let Gartner show you how to shift your security mindset from incident response to continuous response. Access now to learn how you can adapt your security system architecture to "always on" monitoring to better protect your network when perimeter defenses fail.
Posted: 04 May 2016 | Published: 12 Feb 2014

Intel Security

Advanced Threats: Integrating a Sandbox into your Infrastructure
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper offers you the ultimate combination of proactive mitigation, visibility and rich reporting. Access now to learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.
Posted: 03 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Protect your Organization Against Cybercrime in the Digital Era
sponsored by Dimension Data
WHITE PAPER: This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Virtualization Best Practices Guide
sponsored by Kaspersky Lab
WHITE PAPER: This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Access now and learn how to get file-level anti-malware protection, network-level protection and cloud-assisted, real time threat data and the best security approach for your organization's needs.
Posted: 02 May 2016 | Published: 31 Dec 2015

Kaspersky Lab
51 - 75 of 823 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement