IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security White Papers (View All Report Types)
1 - 25 of 210 Matches Previous Page  |  Next Page
Visibility Gap Study
sponsored by Tanium
WHITE PAPER: Download this whitepaper to learn more about the five key challenges for IT in 2020 that this survey uncovered.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Tanium

The Need for Speed: Second Generation EDR
sponsored by Fortinet, Inc.
WHITE PAPER: Even with the use of advanced machine learning and behavioral analytics, endpoint security solutions still can’t prevent 100% of threats. And while endpoint detection and response (EDR) has improved dramatically since its release, there are still gaps left to fill. Take a look at this ESG white paper to learn about second generation EDR.
Posted: 18 Mar 2021 | Published: 29 May 2020

Fortinet, Inc.

Best Practice Makes Perfect: Malware Response In The New Normal
sponsored by Malwarebytes
WHITE PAPER: In this eguide, read through several key findings about cyber security and incident response. Develop an understanding of some malware response best practies, and review some final conclusions when it comes to defending against cyber attacks.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Automated Endpoint Incident Response - An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Learn why automated detection and response is vital to stopping malware attacks, especially those that originate from endpoints.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Enduring From Home - COVID-19’s Impact On Business Security
sponsored by Malwarebytes
WHITE PAPER: In this eguide, walk through the impact Covid-19 has had on business security, and gain insight into some key takeaways about the changing landscape of security.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
WHITE PAPER: Experts say you have an hour to respond to a cyber attack. Learn why automation is key to meeting that challenge.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Protecting data and simplifying IT management with Chrome OS
sponsored by Google Chrome OS
WHITE PAPER: Traditional endpoint security is a zero-sum game. The threats are constantly growing and so are the costs. Protecting endpoints is one of the greatest challenges faced by cybersecurity and IT operations professionals. It's time to rethink the model with Chrome OS.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Google Chrome OS

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Automated Endpoint Incident Response: An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Explore the current market influences that impact the need for automated cyber response and the key methods that can be adopted to compress response times.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Malwarebytes

5 Critical Steps In YOUR ENDPOINT SECURITY STRATEGY
sponsored by BeyondTrust Corporation
WHITE PAPER: Learn about the security risks and challenges to securing endpoints, the 5 essential pieces of a modern endpoint security program and how modern endpoint security solutions reduce risk and work together as part of a holistic strategy.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

BeyondTrust Corporation

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Networks

Security: Creating Trust in a Zero Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Securing the enterprise with 360° visibility: Don’t leave a gap in defenses
sponsored by OpenText
WHITE PAPER: Organizations fight cyberthreats every day, and with more at stake than ever before, including customer data, intellectual property and company reputations, one successful attack can mean game over. This white paper demonstrates why organizations need total visibility and how endpoint detection & response (EDR) can help them achieve it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

OpenText

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Market Guide for Managed Detection and Response Services
sponsored by Expel
WHITE PAPER: According to Gartner, “By 2025, 50% of organizations will be using MDR services for threat monitoring, detection and response functions that offer threat containment capabilities. Ensure the MDR provider is experienced and that their technology stack fits well with your existing security controls and IT environment, from on-premises to cloud.”
Posted: 13 Nov 2020 | Published: 26 Aug 2020

Expel

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

The New Reality
sponsored by BlackBerry
WHITE PAPER: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Know Your Security Model: Traditional vs. Contextual Protection
sponsored by Panda Security
WHITE PAPER: This e-book will cut through the fog that surrounds the term "next-gen endpoint security," exploring the differences between traditional and next-generation cybersecurity protection models, and how Panda's unique protection model employs the best of both to be an industry leading solution.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Panda Security

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation

Endpoint Security for Smart Manufacturing: Protection from the Factory Floor To the Supply Chain
sponsored by BlackBerry
WHITE PAPER: Manufacturers have embraced digital transformation, which means they’re now capturing more and more data on many new and different types of endpoints, both in their factories and throughout their logistics channels. But with all that data comes added security risks. Jump into this white paper to look at these threats and their implications.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

BlackBerry

Microsoft 365 Endpoint DLP: Is it Ready for the Enterprise?
sponsored by InteliSecure
WHITE PAPER: Organizations are in dire need of a reliable and simple way to protect their endpoints – in an effort to meet this growing need, Microsoft responded with their new Endpoint DLP tool, which was announced at a virtual event earlier this year. Read this guide learn more about the new Endpoint DLP tool.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

InteliSecure

Buyer’s Guide: Endpoint Protection
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how to identify, evaluate, and implement endpoint backup that delivers on the top priorities for today’s IT professionals. Inside find 7 characteristics to look for in endpoint protection and see the benefits of Iron Cloud’s brand of Endpoint Backup.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Iron Mountain

5 Steps to Alleviate Endpoint Management Tool Sprawl
sponsored by HCL Technologies Limited India
WHITE PAPER: As organizations are forced to establish long-term remote work strategies, cost-saving initiatives become more important than ever. An effective endpoint management strategy can streamline processes while securing endpoints – at a reduced cost. Read this white paper for 5 ways to alleviate the endpoint management tool sprawl.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

HCL Technologies Limited India

XDR: Extended Detection and Response
sponsored by Palo Alto Networks
WHITE PAPER: Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks
1 - 25 of 210 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences