IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 875 Matches Previous Page  |  Next Page
Fortune 500 Financial Services Firm Closes its Mobile Security Gap with Lookout
sponsored by Lookout
CASE STUDY: Find out how this leading financial services firm closed a critical gap in their mobile data protection strategy using Lookout Mobile Endpoint Security.
Posted: 16 Jan 2019 | Published: 31 Dec 2016

Lookout

Post-Perimeter Security
sponsored by Lookout
VIDEO: In order to stay secure in the post perimeter world, enterprises must first test the health of devices and then trust the user. Download this video to learn how Lookout's zero-trust access model can help secure your organization with continuous monitoring and alerts today
Posted: 16 Jan 2019 | Premiered: 31 Oct 2018

Lookout

Henkel Extends Compliance to Mobile: Security Case Study
sponsored by Lookout
CASE STUDY: Learn how Henkel was able to achieve security for their devices and data using Lookout Mobile Threat Defense.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

Lookout

GDPR Drives Compliance to Top of Security Project List for 2018
sponsored by OneNeck IT
RESEARCH CONTENT: The 2018 Voice of the Enterprise, Information Security survey of 552 security professionals looks at the trends and factors affecting security teams and project prioritization. Read this report to find highlights from 451 Research's survey including top pain points, including compliance and compromised endpoints.
Posted: 04 Jan 2019 | Published: 04 Oct 2018

OneNeck IT

Using Splunk Adaptive Response
sponsored by Splunk
WHITE PAPER: Adaptive response enables security analysts – from hunters to less skilled security staff – to better handle threats by speeding the time to make decisions and actions when responding and adapting to them. Read this white paper to learn about the adaptive response framework capabilities and adaptive response initiative partner integrations.
Posted: 17 Dec 2018 | Published: 31 Dec 2018

Splunk

Managing Mobile Risk in Healthcare
sponsored by MobileIron
RESOURCE: It's extremely important in the healthcare industry for organizations to secure their endpoints – mobile devices included. In this resource, learn how you can use a threat defense application to enhance the security and privacy of your endpoints and protect patient data against cyberattacks.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MobileIron

HP Secure Print Analysis: Are your Printers Easy Prey?
sponsored by HP
RESOURCE: How secure are your printers? Get your rating and a personalized checklist.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Printer Security: The New IT Imperative
sponsored by HP
WHITE PAPER: While it is understandable that printer security has taken a backseat to other endpoints in the past, IT organizations should start addressing the risks unsecured printers pose to their broader IT infrastructure and overall company risk governance. Read on to learn about printer security best practices other IT pros are taking, today.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

How HP Printers Detected London Airport's 2018 Cyberattack
sponsored by HP
CASE STUDY: On April 23, 2018, the cyberterrorist known only as "The Wolf" was able to spread malware across London airport's network using under-secured endpoints. Access this case study to learn how printer threat logs helped IT staff to isolate the attack quickly enough to avoid disrupting operations, negative publicity, and brand damage.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

HP

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

ComputerWeekly.com

Unified endpoint management: The modern way to secure and manage your devices
sponsored by Citrix
WHITE PAPER: In this white paper find out how unified endpoint management can help your organization control and secure different devices across diverse platforms from a single console.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Citrix

The Small and Medium-Sized Business Guide to Securing Printers
sponsored by Epson
WHITE PAPER: Download this guide to raise your awareness of security issues related to modern business printers and common printing practices, as well as considerations for improving printer security in small- and medium-sized businesses (SMBs).
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Epson

Going Global: How a Secure Digital Workspace Can Streamline Your Move into New Markets
sponsored by Citrix
WHITE PAPER: Download this white paper to find out how a unified digital workspace can help your IT teams manage endpoints – whether on-prem, or across hybrid and multi-clouds. You'll find out how you can deliver personalized experiences, offer device choice, simplify management, and more.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

Citrix

Why the Citrix-Microsoft Relationship Will Enhance Digital Workspace Solutions for Customers
sponsored by Citrix
RESOURCE: Download this resource to learn how a Citrix-Microsoft partnership can provide the capabilities your IT team needs to deploy digital workspaces more quickly, effectively and securely.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Citrix

Document and Endpoint Security: Checklists and Discussion Guides
sponsored by Xeretec
WHITE PAPER: Download this white paper to review tips on protecting business documents and securing the multifunction printers and devices that create them.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Xeretec

What's Next in Digital Workspaces: 3 Improvements to Look for in 2019
sponsored by Citrix
RESOURCE: Download this article to uncover three new capabilities or features that will make digital workspaces even more compelling and less complex to deploy and manage in the coming year.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Citrix

End-User Service Delivery: Why IT Must Move Up the Stack to Deliver Real Value
sponsored by Citrix
RESOURCE: Download this resource to learn how unified digital workspaces, with built in automation capabilities, can eliminate low-value, resource-intensive tasks. You'll see how moving the focus to the top of the stack allows IT to better understand the services and apps that will make a difference in supporting digital transformation.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Citrix

Ensure your Data is Protected Without Impacting User Productivity
sponsored by Druva Software
RESOURCE: Download this resource for an overview of an integrated data protection and governance system designed for today's mobile enterprise.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Druva Software

Mobile Vision 2020
sponsored by IBM
RESEARCH CONTENT: Download this resource to learn what the future of enterprise mobility holds, how your organization can prepare, and the UEM platforms that can help ease your organization's management and security challenges.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM

Unified Endpoint Management: IBM MaaS360 with Watson
sponsored by IBM
PRODUCT LITERATURE: Download this resource to discover a UEM platform that consolidates the management of all types of devices, regardless of form factor, platform or OS version.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM

Managing Microsoft Windows 10
sponsored by IBM
WHITE PAPER: Download this white paper for insights into how IBM MaaS360 can provide your organization with a combination of traditional client management and modern API management that enables unified management of all Windows devices.
Posted: 06 Nov 2018 | Published: 06 Nov 2018

IBM

Three ways Citrix Workspace boosts productivity in the office — and beyond
sponsored by Citrix
WHITE PAPER: Download this white paper to see how an end-to-end secure, digital workspace can help your IT team overcome these challenges and securely deliver the apps, desktops, and data your teams rely on-from anywhere, on any device.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Citrix

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware

The Total Economic Impact™ Of VMware Workspace ONE For Windows 10
sponsored by VMware
ANALYST REPORT: In this white paper discover how Workspace ONE can ease endpoint management across devices running Windows 10.
Posted: 29 Oct 2018 | Published: 30 Sep 2018

VMware

5 ways Citrix Workspace puts user experience first
sponsored by Citrix
WHITE PAPER: In this resource find out how a unified digital workspace can help ensure that employees have access to the tools and devices they need, while also easing endpoint management for IT.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Citrix
1 - 25 of 875 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement