IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 839 Matches Previous Page  |  Next Page
Securing the Cloud Adoption Journey
sponsored by British Telecommunications PLC
RESOURCE: The adoption of hybrid and cloud networks brings about new security risks. If security is to be maintained within these environments, a list of obstacles must be overcome. Download this resource to discover the 5 core obstacles that often prevent businesses from securing their cloud environments.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

British Telecommunications PLC

Endpoint Detection & Response Is Not Enough
sponsored by Arctic Wolf
WHITE PAPER: Many SMBs are leveraging endpoint detection and response (EDR) tools to safeguard their data and devices – but EDR alone isn't enough to create full, comprehensive protection. Find out how you can complement EDR's essential functionalities to lend new layers of security to your organization's defenses.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Arctic Wolf

Best practices for simple, secure device management
sponsored by Citrix
WHITE PAPER: Download this white paper to learn about a unified workspace that offers full security and control for IT, mobile productivity for your business, and freedom of choice for employees.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Citrix

Traditional Workspaces vs. Secure Digital Workspaces
sponsored by Citrix
RESOURCE: Download this infographic to learn why secure digital workspaces are the way of the future and discover the management, productivity and security benefits that ensue.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Citrix

Beyond the Cubicle: Life in the Digital Workspace
sponsored by Citrix
WHITE PAPER: Click here to learn how a unified workspace platform that spans apps, desktops, and endpoints can simplify overall management and security for IT.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Citrix

Security for the Modern Worker
sponsored by Dell and Microsoft
RESEARCH CONTENT: Learn how employees can be empowered to work their way while protecting your company's data wherever it goes.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Dell and Microsoft

Think beyond UEM to accelerate your digital transformation journey
sponsored by Citrix
WHITE PAPER: Download this resource to learn about a single point of management for endpoints, apps, content, identities, infrastructure, and networking across your environment that can drive transformation for your business and ease security and management challenges for IT.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

Three Reasons to Choose Citrix Workspace Over Vmware Workspace One
sponsored by Citrix
WEBCAST: The need for secure endpoint management is becoming increasingly essential as endpoints grow in scope and complexity. But which UEM platform is best for your organization? Tune in to compare Citrix Workspace and VMware's Workspace ONE
Posted: 30 Aug 2018 | Premiered: Jul 18, 2018

Citrix

Citrix Workspace App Overview
sponsored by Citrix
WEBCAST: Wondering what exactly the Citrix Workspace app has to offer?Watch this brief video for an overview of its features; including access to everything users need from web, apps, files, and desktops – all in one place.
Posted: 30 Aug 2018 | Premiered: May 8, 2018

Citrix

How to Proactively Prevent Security Threats across Endpoints
sponsored by Cylance
RESEARCH CONTENT: This Forrester Total Economic Impact Report investigates the effect of Cylance on organizations' ability to protect their critical assets and endpoints.
Posted: 29 Aug 2018 | Published: 28 Feb 2018

Cylance

Digital Workspace Showdown
sponsored by Citrix
WHITE PAPER: Which digital workspace platform is right for your organization? View this infographic for a comparison of VMware's vs. Citrix's digital workspace platforms in terms of user experience, cloud management, security and more.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Citrix

Competitive System Resource Impact Testing
sponsored by Cylance
WHITE PAPER: Download this whitepaper for a look at the several tests conducted to determine the impact on a computer system and the user's ability to perform several common actions and their impact while detecting and quarantining malware. Read on to see the results.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cylance

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

A Computer Weekly buyer's guide to going beyond desktop Computing
sponsored by ComputerWeekly.com
EGUIDE: A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

ComputerWeekly.com

Mid-Year Global Threat Report 2018
sponsored by MobileIron
RESOURCE: Explore this mid-year 2018 report as it provides insights into how attackers are targeting enterprise customers via mobile device, network, applications, and operating system vulnerabilities.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

MobileIron

The Criminal Justice Information Services (CJIS) Compliance for Mobile Devices
sponsored by MobileIron
RESOURCE: The FBI's Criminal Justice Information Services (CJIS) Security Policy defines security requirements for the entire industry. Download this resource to learn how your organization's mobile device management policy can comply with CJIS standards.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

MobileIron

Advanced Endpoint Protection
sponsored by NSS Labs
EBOOK: In this product analysis by NSS Labs, learn how you can detect, prevent, and continuously monitor threats, with the right advanced endpoint protection approach for your organization.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

NSS Labs

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Best Practices for a Modern Approach to PC Management
sponsored by VMware
WHITE PAPER: Click here to learn about a modern management approach that complements your existing management with UEM, then transitions to a co-managed model where System Center Configuration Manager (SCCM) and UEM are managing the same device.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

VMware

CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by SearchSecurity.com
EZINE: As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans
Posted: 17 Aug 2018 | Published: 17 Aug 2018

SearchSecurity.com

Modern Management of Windows Devices with VMware Workspace One
sponsored by VMware
RESOURCE: Discover ways your organization can let its employees work with a wide range of devices, on site or remote, while maintaining security and compliance through a unified management platform.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

VMware

Work Smart and Stay Safe with Chrome Enterprise
sponsored by Google
WEBCAST: Tune in, to learn about an OS and browser that offers proactive protections, granular policy controls, and continuous vulnerability management to help prevent breaches.
Posted: 16 Aug 2018 | Premiered: Jul 26, 2018

Google

Controlling the Uncontrollable End User
sponsored by Citrix
RESOURCE CENTER: Read this article to learn how secure digital workspaces can provide platforms that position your organization to give users the experience and options they demand, while providing unified security and management functionality for IT.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Citrix

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE CENTER: Discover a new approach to cybersecurity that protects the organization when work is happening anywhere on any mobile device.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Citrix

2018 Cyberthreat Defense Report
sponsored by Imperva
RESEARCH CONTENT: This 2018 Cyberthreat Defense Report examines data polled from 1,200 qualified IT security decision-makers and practitioners and compares the results with findings from previous years. Explore the report's key findings about the impact that cloud, mobile devices, containers, and threat intelligence are having on cybersecurity.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Imperva
1 - 25 of 839 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement