IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 
Definition continues below.
Endpoint SecurityReports
76 - 100 of 571 Matches Previous Page  | Next Page
Understand and Counter Insider Threats with Behavioral Analytics
sponsored by Hewlett-Packard Company
WEBCAST: This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.
Posted: 25 Feb 2014 | Premiered: Nov 14, 2013

Hewlett-Packard Company

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Security Trends 2014
sponsored by Global Knowledge
WHITE PAPER: In this resource, find out what you need to know about security trends in 2014.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Keeping Distributed Endpoints Safe and Secure
sponsored by IBM
WHITE PAPER: In this white paper, explore a single console management solution that helps IT maintain visibility and control over a disparate endpoint environment. Click now to unveil key features that help reduce risk and ensure compliance without adding complexity or costs.
Posted: 18 Feb 2014 | Published: 30 Jun 2012

IBM

Enterprise Endpoint Backup Solutions Get a Makeover
sponsored by Druva Software
WHITE PAPER: Access this report to learn why endpoint backup must evolve to meet the needs of the mobile workforce.
Posted: 11 Feb 2014 | Published: 24 Oct 2013

Druva Software

Q&A on Protecting and Enabling the Anytime, Anywhere Worker
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Watch this informative webcast to find out what Rachel Dines recommends for protection management.
Posted: 03 Feb 2014 | Premiered: 10 Oct 2013

CommVault Systems, Inc.

Reducing the Cost and Complexity of Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.
Posted: 31 Jan 2014 | Published: 30 Sep 2013

IBM

Whitepaper: Four customers who never have to refresh their PCs again
sponsored by Citrix
WHITE PAPER: This whitepaper will help you learn more about four organizations that never have to refresh their PCs again, and can now ensure a fully up-to-date experience for employees on any type of endpoint – including low-cost thin clients.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Citrix

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Endpoint Security IT Decision Center Handbook 1
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

SearchSecurity.com

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST: This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Lumension

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.
Posted: 03 Feb 2014 | Published: 31 May 2013

IBM

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Endpoint Security IT Decision Center Handbook 3
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Endpoint Security Best Practices
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, uncover best practices on how to effectively plan and deploy multi-layered endpoint security that can defend against emerging cyber-attacks.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

Symantec Corporation

Emerging Security Trends and Risks: Insights for the Business Executive
sponsored by IBM
WHITE PAPER: This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.
Posted: 15 Nov 2013 | Published: 30 Jun 2012

IBM

File Sync and Share: Recent Developments and Points to Address in your Usage Policy
sponsored by Dropbox for Business
EGUIDE: This e-guide recounts the latest advances in enterprise collaboration technology and explains why security remains a top priority for the companies that leverage it. Read on to learn more.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Dropbox for Business

Why the Endpoint Must be the New Security Focus
sponsored by Bit9, Inc.
WHITE PAPER: Download this new eBook now to learn how a holistic security stance that combines network and endpoint security will provide greater automated intelligence and network-layer awareness and best practices for achieving real-time situational awareness to improve security and allow for better-informed decision-making.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

Bit9, Inc.

Endpoint Security Technology
sponsored by Symantec Corporation
EGUIDE: Access this expert e-guide for a technical overview of endpoint protection software, and learn to evaluate various vendors through valuable insight on software's different capabilities in reducing security risks for business well-being.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation

CIO Series: How Big Data Can Help Enterprises Build Better Security Defenses
sponsored by Proofpoint, Inc.
WHITE PAPER: This whitepaper explores some of the basic aspects of Big Data and discusses how CIOs and CISOs can apply these technologies to address the next generation of security challenges enterprises face today.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Proofpoint, Inc.

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Defense Against the Dark Arts: Finding and Stopping Advanced Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn critical information about today’s advanced threat landscape and what you need to do to stay secure.
Posted: 29 Oct 2013 | Published: 29 Oct 2013

Proofpoint, Inc.
76 - 100 of 571 Matches Previous Page    2 3 4 5 6 7    Next Page
 
ENDPOINT SECURITY DEFINITION (continued): …  inventory scanners and point-of-sale terminals. A server or gateway hosts the centralized security program, which verifies logins and sends updates and patches when needed. Simple forms of endpoint security include personal firewalls or anti-virus software that is distributed and then monitored and updated from the server. The term is evolving, however, to include security elements such as intrusion detection and prevention, anti-spyware software, and behavior-blocking software (programs that monitor devices and look for operations and actions that are typically initiated by unsanctioned applications … 
Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement