IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 868 Matches Previous Page  |  Next Page
HP Secure Print Analysis: Are your Printers Easy Prey?
sponsored by HP
RESOURCE: How secure are your printers? Get your rating and a personalized checklist.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Printer Security: The New IT Imperative
sponsored by HP
WHITE PAPER: While it is understandable that printer security has taken a backseat to other endpoints in the past, IT organizations should start addressing the risks unsecured printers pose to their broader IT infrastructure and overall company risk governance. Read on to learn about printer security best practices other IT pros are taking, today.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

HP

How HP Printers Detected London Airport's 2018 Cyberattack
sponsored by HP
CASE STUDY: On April 23, 2018, the cyberterrorist known only as "The Wolf" was able to spread malware across London airport's network using under-secured endpoints. Access this case study to learn how HP printers helped isolate the attack quickly enough to avoid disrupting operations, negative publicity, noncompliance fines, and brand damage.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

HP

Ensure your Data is Protected Without Impacting User Productivity
sponsored by Druva Software
RESOURCE: Download this resource for an overview of an integrated data protection and governance system designed for today's mobile enterprise.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Druva Software

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 09 Nov 2018 | Published: 09 Nov 2018

ComputerWeekly.com

Mobile Vision 2020
sponsored by IBM
RESEARCH CONTENT: Download this resource to learn what the future of enterprise mobility holds, how your organization can prepare, and the UEM platforms that can help ease your organization's management and security challenges.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM

Unified Endpoint Management: IBM MaaS360 with Watson
sponsored by IBM
PRODUCT LITERATURE: Download this resource to discover a UEM platform that consolidates the management of all types of devices, regardless of form factor, platform or OS version.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM

Managing Microsoft Windows 10
sponsored by IBM
WHITE PAPER: Download this white paper for insights into how IBM MaaS360 can provide your organization with a combination of traditional client management and modern API management that enables unified management of all Windows devices.
Posted: 06 Nov 2018 | Published: 06 Nov 2018

IBM

Unified endpoint management: The modern way to secure and manage your devices
sponsored by Citrix
WHITE PAPER: In this white paper find out how unified endpoint management can help your organization control and secure different devices across diverse platforms from a single console.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Citrix

Three ways Citrix Workspace boosts productivity in the office — and beyond
sponsored by Citrix
WHITE PAPER: Download this white paper to see how an end-to-end secure, digital workspace can help your IT team overcome these challenges and securely deliver the apps, desktops, and data your teams rely on-from anywhere, on any device.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

Citrix

The Total Economic Impact™ Of VMware Workspace ONE For Windows 10
sponsored by VMware
ANALYST REPORT: In this white paper discover how Workspace ONE can ease endpoint management across devices running Windows 10.
Posted: 29 Oct 2018 | Published: 30 Sep 2018

VMware

5 ways Citrix Workspace puts user experience first
sponsored by Citrix
WHITE PAPER: In this resource find out how a unified digital workspace can help ensure that employees have access to the tools and devices they need, while also easing endpoint management for IT.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Citrix

The Small and Medium-Sized Business Guide to Securing Printers
sponsored by Epson
WHITE PAPER: Download this guide to raise your awareness of security issues related to modern business printers and common printing practices, as well as considerations for improving printer security in small- and medium-sized businesses (SMBs).
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Epson

Unified Endpoint Management in the cloud: Why it's critical to the success of your company
sponsored by Citrix
WHITE PAPER: Read this report to further uncover why moving to a holistic UEM approach can help your organization remain competitive in the long run, and examine the cost tradeoffs of deploying a UEM solution in an internal data center versus implementing a cloud-based SaaS solution.
Posted: 23 Oct 2018 | Published: 30 Apr 2018

Citrix

Druva inSync Cloud-based Data Protection for Endpoints and Cloud Apps
sponsored by Druva Software
DATA SHEET: In order to unify the backup and protection of your disparate mobile endpoints under a single roof, read on here. You'll gain access to the features of a data protection and information governance solution for managing dispersed data and cloud applications: Druva inSync. Inside Druva also compares its endpoint protection to Carbonite Mozy.
Posted: 19 Oct 2018 | Published: 19 Oct 2018

Druva Software

Reevaluating Legacy Enterprise Backup Solutions for the Mobile Workforce
sponsored by Druva Software
ANALYST REPORT: Blue Hill Research conducted interviews with four organizations that evaluated different enterprise endpoint backup solutions to see how they addressed mobile workforce concerns of encryption, data privacy regulations, and service disruptions. Read on to see how products like Druva inSync factor into the evaluation.
Posted: 18 Oct 2018 | Published: 30 Jun 2018

Druva Software

2018 User Risk Report
sponsored by Wombat Security Technologies
RESEARCH CONTENT: More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results. Could some of these folks be working at your organization?
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Wombat Security Technologies

Best Practices for Choosing an Endpoint Detection and Response (EDR) Solution
sponsored by Bitdefender
VIDEO: With the increase in employee mobility and the use of off-premise endpoints, organizations need advanced threat detection and response tools to assist them. In this webinar, explore how an endpoint, detection and response (EDR) system can help combat threats and how to choose the right one for your organization.
Posted: 11 Oct 2018 | Premiered: 05 Oct 2018

Bitdefender

Cryptocurrency Mining Craze Going for Data Centers
sponsored by Bitdefender
RESOURCE: With the recent Bitcoin craze, and its peaking at $19,000 per unit, cybercriminals are focusing on cryptomining, instead of traditional ransomware. Download this resource to get a full report on the state of cryptocurrency mining so you can better protect you data centers and endpoints.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Bitdefender

Considerations for EDR Adoption
sponsored by Bitdefender
RESEARCH CONTENT: Navigate through the issues surrounding endpoint detection response (EDR), explore the business value of its adoption, and learn recommendations for the range of considerations and next steps in the decision-making process. Download to learn more.
Posted: 10 Oct 2018 | Published: 30 Sep 2018

Bitdefender

Why Your Traditional Endpoint Security May be Putting You at Risk
sponsored by Fortinet, Inc.
RESOURCE: According to a recent study, 63% of organizations are unable to monitor endpoint devices when they leave the corporate network. Download this white paper to learn more shocking statistics that will make you rethink your organization's traditional endpoint security practices.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Fortinet, Inc.

Five Endpoint Attacks Your Antivirus Won't Catch: A Guide to Endpoint Detection and Response
sponsored by AlienVault
RESOURCE: In this white paper, discover how to quickly evolve your threat detection strategy with 5 endpoint attacks your antivirus won't catch.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

AlienVault

Advanced Endpoint Protection Test
sponsored by Bitdefender
WHITE PAPER: An advanced endpoint protection test was conducted to look at the proactive protection, exploit, false alarm, and ransomware capabilities of Bitdefender's product, GravityZone Elite Security, against 9 of its competitors. Read on for the results.
Posted: 08 Oct 2018 | Published: 30 Nov 2017

Bitdefender

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware

Evaluate Desktop Management Tools
sponsored by Dell and Intel
EGUIDE: Download this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.
Posted: 05 Oct 2018 | Published: 04 Oct 2018

Dell and Intel
1 - 25 of 868 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement