IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
51 - 75 of 731 Matches Previous Page  |  Next Page
Meaningful Measurement
sponsored by LogicNow
WHITE PAPER: This white paper teaches you how to measure the true impact of cybercrime and mitigate it moving forward. Access now to better understand methods used to commit cyber attacks and what they are costing your organization and organizations around the world.
Posted: 06 Apr 2016 | Published: 01 Mar 2016

LogicNow

IDS Evaluation Guide
sponsored by AlienVault
WHITE PAPER: This white paper provides a useful reference for evaluating IDS tools. In it, you'll learn the critical components of host and network IDS, giving you real-time threat intelligence to quickly respond to threats.
Posted: 04 Apr 2016 | Published: 01 Mar 2016

AlienVault

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at cloud data loss prevention, the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

ICS Survey
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows the security survey results taken by 314 industry respondents. Access now to learn about organizational breach concerns and how businesses have responded to recent threats.
Posted: 31 Mar 2016 | Published: 30 Jun 2015

SurfWatch Labs

Experience the Business Value of ZENworks Suite
sponsored by MicroFocus
WHITE PAPER: Access this white paper to learn about a management suite combining the essential client management, software asset management, virtualization, security, mobility, and IT services functions your IT organization depends on into one centralize management platform.
Posted: 31 Mar 2016 | Published: 30 Sep 2015

MicroFocus

How to Choose the Right Cyber Threat Intelligence Provider
sponsored by SurfWatch Labs
WHITE PAPER: This white paper teaches you what your organization should look for from its threat intelligence software. Learn how to bring cybersecurity in line with your business operations, provide necessary context to prioritize and take meaningful action on specific threats.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Addressing Key Usability and Supportability Issues for ZENworks Suite
sponsored by MicroFocus
WHITE PAPER: This white paper takes a look at the added value and improved capabilities available for ZENworks Suite. You'll learn how this support pack, specifically designed with the user in mind, is able to overcome a number of former user pain points.
Posted: 30 Mar 2016 | Published: 31 Dec 2015

MicroFocus

Defending against POS Malware
sponsored by AlienVault
WHITE PAPER: This white paper takes a look at PoS security and some of the common types of malware used to exploit these systems. Access now to learn about the wide range of hardware and applications, including ubiquitous POS terminals in retail locations.
Posted: 30 Mar 2016 | Published: 01 Feb 2016

AlienVault

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction
sponsored by OptioLabs
VIDEO: This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.
Posted: 29 Mar 2016 | Premiered: 10 Mar 2016

OptioLabs

The Importance of Threat Intelligence, Visibility and Disrupting the Kill Chain
sponsored by Dell SecureWorks
WHITE PAPER: This white paper shows you a better, more comprehensive approach to endpoint security challenges. Learn how to catch bad network behavior and learn telltale signs that a breach is imminent.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Securing the Enterprise - 5 Pragmatic Steps to Security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents five major areas of focus for the practical CISO. Build a culture of security across your organization and ensure all employees understand that no one is excluded from responsibility.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Q4 Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: This report outlines next-generation security approaches to better fortify mobile enterprise deployments against malicious attacks. Access now to learn about the current mobile threat landscape and learn how you can better protect against new, evolving mobile malware.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

MobileIron

ForeScout CounterACT- Datasheet
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores ways to continuously monitor network traffic and ways to integrate your networking infrastructure to identify devices as soon as they access the network.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Northern Health and Social Care Trust - Case Study
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study of Northern Health shows you the steps they took to gain real-time visibility over all network devices while never interrupting their critical health and social care services. Access now to learn about how easy it is to deploy this automated security solution and better comply with today's standards.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Norwich School - Case Study
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper describes the network security challenges that Norwich School faced and how they found a solution that met their every need. Access now to learn how you can have increased visibility and save time by easily identifying potential threats before they become a major problem.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Credit Union Infographic
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Case Study: You Can't Manage what You Can't See
sponsored by ForeScout Technologies, Inc.
CASE STUDY: In this case study, uncover how Pioneer Investments, a global investment management firm, solved their network access control (NAC) woes and shed a light on whom and what was on their network.
Posted: 25 Mar 2016 | Published: 25 Nov 2015

ForeScout Technologies, Inc.

Protecting Your Network from Internet Connected Devices
sponsored by Ixia
WHITE PAPER: Find out how the "connected car" actually just connects to the Internet and why testing to ensure the safety of this network is as critical as anything else (just as is validating the automotive Ethernet system and basic network connections are).
Posted: 25 Mar 2016 | Published: 24 Feb 2016

Ixia

Case Study: State of Missouri Uncovers Hidden Network Devices
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study details how the State of Missouri shined a light on their network access and traffic to uncover how many devices, secure and vulnerable, were on at any given time.
Posted: 25 Mar 2016 | Published: 27 Jan 2016

ForeScout Technologies, Inc.

Privacy Shield: The New Data Transfer Agreement
sponsored by UKFast
WHITE PAPER: In this white paper, you will learn how to take advantage of cloud versatility, best-of-breed technology and enterprise-grade infrastructure without opening up customer data to the uncertainties of global entangled hosting infrastructures.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

UKFast

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Demo of OptioAware by OptioLabs
sponsored by OptioLabs
VIDEO: View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.
Posted: 25 Mar 2016 | Premiered: 21 Dec 2015

OptioLabs

Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020
sponsored by Carbon Black
WHITE PAPER: This EMA research report provides "beyond the surface" insight on variety of enterprise-capable solution providers. Access this report now and learn about research focused on solution providers providing proactive next-generation endpoint security services covering prevention, detection and response.
Posted: 29 Mar 2016 | Published: 29 Feb 2016

Carbon Black
51 - 75 of 731 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement