IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
51 - 75 of 639 Matches Previous Page  |  Next Page
Your CEO Just Lost His Laptop - Now What?
sponsored by Druva Software
WEBCAST: Access this webcast to learn about an endpoint backup program that protects data from loss, threats, allows for secure file sharing, and complies with eDiscovery. Tune into to learn about the importance of implementing an effective endpoint backup strategy now.
Posted: 13 Feb 2015 | Premiered: Feb 13, 2015

Druva Software

A New Approach to Endpoint Data Protection for Mobile Enterprise
sponsored by Druva Software
WEBCAST: Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.
Posted: 12 Feb 2015 | Premiered: Feb 12, 2015

Druva Software

CIOs: Rethink Endpoint Data Protection in the Age of Mobility
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about seventeen business benefits of endpoint backup.
Posted: 12 Feb 2015 | Published: 11 Feb 2015

Druva Software

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Webinar: Endpoint Data Privacy in The Cloud
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover an endpoint backup tool for data stored in the cloud.
Posted: 11 Feb 2015 | Premiered: Feb 11, 2015

Druva Software

17 Business Benefits of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about seventeen business benefits of endpoint backup.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Druva Software

10 Common Pitfalls of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about the top 10 pitfalls commonly seen in endpoint backup and how to avoid them.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Druva Software

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: In this exclusive series of security-based articles, IT experts examine and discuss the keys to creating a comprehensive security strategy that keeps all enterprise endpoints secure – as well as the pitfalls that can leave an organization vulnerable.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

SearchEnterpriseDesktop

Sysinternals Still Essential for Desktop Troubleshooting
sponsored by SearchEnterpriseDesktop
EBOOK: The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchEnterpriseDesktop

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

How an endpoint management project reduced server security risk and improved efficiency
sponsored by IBM
CASE STUDY: Inside this case study, learn about an organization that benefitted from using an endpoint management tool to improve security compliance and minimize operation costs. Discover the main activities that were accomplished during the project by examining the proof of concept.
Posted: 29 Jan 2015 | Published: 03 Jul 2014

IBM

Complete Breakdown of the Endpoint Security Marketplace
sponsored by Webroot
WHITE PAPER: This exclusive white paper looks at the evolution of the endpoint security marketplace as it fights to limit threats that attack antivirus weaknesses, circumvent security protection, and compromise endpoint systems.
Posted: 29 Jan 2015 | Published: 16 Dec 2014

Webroot

Webroot Secure Anywhere ® Business Endpoint Protection
sponsored by Webroot
WHITE PAPER: This exclusive white paper dives into the changes you must make to your endpoint security to move on from a slow, heavy approach that ultimately causes more problems than it solves.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Webroot

IBM Endpoint Manager for Lifecycle Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint and lifecycle management solution that provides an accurate and comprehensive single source of truth for managing all of your endpoints in a single-server.
Posted: 29 Jan 2015 | Published: 13 Oct 2014

IBM

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

IBM Endpoint Manager for Core Protection
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about an endpoint manager with core protection that provides organizations with an automated, easy-to-use solution to ensure the protection of sensitive data and much more.
Posted: 28 Jan 2015 | Published: 14 Oct 2014

IBM

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Mobility Management Evolves Into BYOD and Beyond
sponsored by SearchEnterpriseDesktop
EBOOK: Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

SearchEnterpriseDesktop
51 - 75 of 639 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement