IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
51 - 75 of 592 Matches Previous Page  | Next Page
Remote Laptop and Tablet Backup Considerations
sponsored by Druva Software
EGUIDE: This expert e-guide explains the necessity of adapting storage to fit the needs of an increasingly mobile workforce. It also explains the benefits of a solution that delivers remote laptop and tablet backup.
Posted: 22 May 2014 | Published: 22 May 2014

Druva Software

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

A Step-by-Step Survival Guide to Data Protection
sponsored by Druva Software
WHITE PAPER: This white paper provides step-by-step advice on how organizations can protect their corporate data from threats like lost devices and eDiscovery issues.
Posted: 16 May 2014 | Published: 30 Apr 2014

Druva Software

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture
sponsored by Webroot
WHITE PAPER: This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014

Webroot

Redefining Defense-in-Depth
sponsored by Lumension
WHITE PAPER: This exclusive report examines how traditional protection solutions are decreasing in effectiveness and discusses a new defense-in-depth approach that can keep you endpoints safe from even the most malicious attackers.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Sophos, Inc.

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense, Inc.
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense, Inc.

Information Security Magazine – April 2014
sponsored by SearchSecurity.com
EZINE: In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchSecurity.com

ENTERPRISE SERVICES BLOG: Top 10 Tips to Achieve Enterprise Mobility in Asia
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: 25 Mar 2014 | Published: 18 Feb 2014

Hewlett-Packard Company

RSA Security Operations Management (SecOps) in Action
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
Posted: 20 May 2014 | Published: 21 Mar 2014

RSA, The Security Division of EMC

Understanding Microsoft Office 2013 Features, Licensing and Security
sponsored by SearchEnterpriseDesktop
EBOOK: Before moving to Microsoft Office 2013 or Office 365, IT pros should compare features, licensing schemes and application usage and be aware of emerging Office alternatives.
Posted: 19 May 2014 | Published: 22 May 2014

SearchEnterpriseDesktop

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER: This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013

Webroot

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Choosing A Flexible, Secure Cloud Deployment Strategy
sponsored by Code42
WHITE PAPER: This white paper highlights a system that lets organizations select their preferred cloud deployment strategy, ensuring they meet or exceed industry standards for data security. Read on to get the flexibility you desire, and the security you need.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
CASE STUDY: This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire
51 - 75 of 592 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement