IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint Security Reports
51 - 75 of 700 Matches Previous Page  |  Next Page
10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Case Study: Protect Your Network with Enhanced Visibility
sponsored by Solarwinds MSP
CASE STUDY: Discover how Pearl Drums U.S. was able to get the antivirus, patch management, and automated monitoring they needed to keep their organization running efficiently. Learn how they gained insight into their network and now proactively protect and secure their IT environment with minimal IT resources.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

Solarwinds MSP

The Security Survival Guide for Growing Businesses
sponsored by Trustwave
WHITE PAPER: This guide shows you step by step why your security may be suffering and offer practical tips for addressing critical points so you can take your data protection to the next level.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

Trustwave

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

IT Security for Retail
sponsored by Trustwave
WHITE PAPER: This white paper emphasizes a multi-layer defense program against attacks. This approach helps you avoid infection, halt propagation, stop exfiltration and unify your security systems.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

IT Security for Financial Sector
sponsored by Trustwave
WHITE PAPER: Learn why threats are growing and how to keep up with them in this white paper. See where financial organizations around the world are falling short of best security practices and how you can avoid making the next £50 million mistake.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Security Pressures Report
sponsored by Trustwave
WHITE PAPER: The recommendations in this report serve as a reliable compass of where your security efforts need to be. Use these suggestions to not only ease pressure, but to improve your security posture overall.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

Trustwave

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

First Principles for Network Defenders: A Unified Theory for Security Practitioners
sponsored by Palo Alto Networks
WHITE PAPER: In this paper, we propose that the first principle for all network defenders is to prevent high-risk material impact to the organization. The three essential tasks that support the first principle are: threat prevention, threat detection, and threat eradication.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Palo Alto Networks

Infographic: Breach Preparedness
sponsored by AllClear ID
WHITE PAPER: This infographic shows you statistics from business executives and consumers on how they handle and perceive a data breach. Learn how to properly deal with a major breach now, before it's too late to formulate a proper breach response plan.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Breach response isn't about losing data. It's about keeping your customers.
sponsored by AllClear ID
WHITE PAPER: The time to prepare for a data breach is today. Give your customers reassurance that they are taken care of and help resolve any harm done to their identity. Learn how to respond to customer queries effectively and reduce customer response time for any size breach to as little as 48 hours.
Posted: 30 Jun 2016 | Published: 01 May 2016

AllClear ID

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

Ransomware Response Guide
sponsored by IBM
WHITE PAPER: The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.
Posted: 26 Jul 2016 | Published: 01 May 2016

IBM

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

Endpoint threat detection gets more response
sponsored by Hewlett Packard Enterprise
EGUIDE: Discover how security teams worldwide are attempting to stop cyber-threats using various security methods and endpoint tools. InfoSec professionals have to evaluate what's best for their organizations and make the best judgment at the time -- knowing full well that today's security approach may become tomorrow's liability.
Posted: 07 Jul 2016 | Published: 06 Jul 2016

Hewlett Packard Enterprise

Advantages vs. Disadvantages of Taking a "Hack Back" Approach to Cyber Crime
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Best Practices for Monitoring Today's Murky Threat Environment
sponsored by Hewlett Packard Enterprise
EGUIDE: In today's murky threat environment, even cybersecurity firms are vulnerable to attack – proving that there is no such thing as "100% secure." Access this e-guide for tips from security expert Michael Cobb to help you prepare for a security vendor hack. Plus, learn the latest network monitoring means for rooting out fast-moving malicious actors.
Posted: 07 Jul 2016 | Published: 24 Jun 2016

Hewlett Packard Enterprise

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Intelligent Endpoint Threat Defense
sponsored by Intel Security
TRANSCRIPT: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Published: 01 Jun 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover
sponsored by Intel Security
PODCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast
sponsored by Intel Security
WEBCAST: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Premiered: May 1, 2016

Intel Security

Neutralize Emerging Threats: Reducing the Time to Discover and Recover Transcript
sponsored by Intel Security
WHITE PAPER: Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.
Posted: 29 Jun 2016 | Published: 01 May 2016

Intel Security
51 - 75 of 700 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement