IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 588 Matches Previous Page  |  Next Page
Preparing for COVID-19-Related Threats
sponsored by TechTarget
RESOURCE: Phishing scams and ransomware attacks that leverage fears surrounding the coronavirus are at an all-time high. Now more than ever, it's critical to ensure the protection of remote devices, employee email inboxes and other vulnerable endpoints. By completing our brief survey, you'll receive a copy of The Cybersecurity Professional's
Posted: 01 Jun 2020 | Published: 01 Jun 2020

TechTarget

DaaS Proactive Security Management
sponsored by HP Inc
RESOURCE: Managing the security of each user device is complicated, especially at large organizations with a mix of operating systems and device types. In this blog post, take a closer look at HP’s Proactive Security Management suite, designed to help organizations monitor their endpoints and proactively address and mitigate security issues.
Posted: 29 May 2020 | Published: 29 May 2020

HP Inc

Learn How to Enhance Visibility and Early Detection by Using the SOC Triad
sponsored by Vectra Networks
WEBCAST: In this podcast, join security experts and business leaders from Cybereason, Vectra and Splunk as they discuss how to enhance visibility and early detection by using the SOC triad. But what is the SOC triad? Give the podcast a listen to discover the 3 components of the SOC triad and learn how to operationalize it.
Posted: 29 May 2020 | Premiered: Apr 24, 2020

Vectra Networks

Automated and Integral Protection for Company-Owned IT Systems in the Home Office
sponsored by Matrix42
WEBCAST: In this webinar, learn about the benefits of Matrix42 Workspace Security, automated protection for private IT systems in the home office.
Posted: 28 May 2020 | Premiered: May 28, 2020

Matrix42

USM Case Study
sponsored by Matrix42
CASE STUDY: In this case study, follow the journey of USM, an international furniture system manufacturer, as they partner with Matrix42 to integrate a client management tool designed to unify and manage their growing number of endpoints. Read on to unlock the results.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

Smart Protection Complete
sponsored by Trend Micro
DATA SHEET: In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.
Posted: 20 May 2020 | Published: 20 May 2020

Trend Micro

Steps to secure endpoints against threats.
sponsored by Cisco Umbrella
EBOOK: With this critical infrastructure, applications, and sensitive data now stored in the cloud, attackers have even more incentive to target endpoints as their easiest point of entry. Access this e-book to learn about an effective security solution that is simple, open, and automated.
Posted: 20 May 2020 | Published: 20 May 2020

Cisco Umbrella

10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

Case Study Fastweb
sponsored by Matrix42
CASE STUDY: In this case study, learn how Matrix42 helped Fastweb, a major Italian communications operator, provide comprehensive services to its customers such as, vulnerability and patch management, desktop remote control, hardware and software inventory, and more.
Posted: 15 May 2020 | Published: 15 May 2020

Matrix42

The Big Easy - 3 steps for better security
sponsored by Cisco Umbrella
VIDEO: In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.
Posted: 15 May 2020 | Premiered: 11 Dec 2019

Cisco Umbrella

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Endpoint Standard Next-Generation Antivirus and Behavioral EDR
sponsored by VMware International Unlimited Company
DATA SHEET: Learn how you can protect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defend your organization from today’s advanced cyberattacks.
Posted: 12 May 2020 | Published: 12 May 2020

VMware International Unlimited Company

Enterprise Detection and Response Providers, Q1 2020
sponsored by CrowdStrike
ANALYST REPORT: As the enterprise detection and response (EDR) space continues to evolve, security analytics will dictate which providers will lead the pack. In this Forrester Wave, find 12 different EDR providers that matter the most and how they stack up.
Posted: 12 May 2020 | Published: 12 May 2020

CrowdStrike

Building the Business Case for Improving Endpoint Security
sponsored by VMware International Unlimited Company
WHITE PAPER: According to VMware Carbon Black’s latest Global Threat Report, cyberattackers are targeting endpoints at an increasing rate. So now you must get your boss, and other executives in agreement – but how? This white paper outlines how to build a business case for endpoint security investment. Read on to get started.
Posted: 06 May 2020 | Published: 06 May 2020

VMware International Unlimited Company

Citrix Workspace on Google Cloud Platform
sponsored by Citrix
WHITE PAPER: While Google is a great way to offer your employees a variety of options as far as programs, device choice, and device location, it can be hard to manage from a business perspective. Check out this short white paper to learn how choosing a third-party Google workspace solution can simplify security, permissions, and infrastructure management.
Posted: 06 May 2020 | Published: 06 May 2020

Citrix

IT Faces New Security Challenges in Wake of COVID-19
sponsored by CoreView
WHITE PAPER: As businesses transition to face the new reality of working from home and undergo massive technology upgrades to support this trend, they also have to address a remarkable uptick in cybercrime. Check out this white paper to learn what threats you may be facing, and ways to address them.
Posted: 06 May 2020 | Published: 06 May 2020

CoreView

Risk & Response: Defending Financial Institutions
sponsored by VMware International Unlimited Company
WHITE PAPER: Each year, the financial industry remains at the top of the verticals targeted by hackers – who typically look to exploit endpoints. This white paper provides additional financial industry threat insights, as well as an overview of an endpoint detection and response offering that may be able to help.
Posted: 05 May 2020 | Published: 05 May 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Customer Voice
sponsored by VMware International Unlimited Company
WHITE PAPER: The VMware Carbon Black Cloud is designed to simplify threat investigation, remediation and prevention by unifying disparate security efforts into a single, cohesive platform. Read this customer voice white paper to see what users, like DraftKings and Evernote, had to say about their experience.
Posted: 04 May 2020 | Published: 04 May 2020

VMware International Unlimited Company

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Getting More from Less
sponsored by VMware International Unlimited Company
WHITE PAPER: In order to address the growing volume of cyberattacks, organizations are adding new tools and systems to their stack. However, each addition also increases the intricacy of the environment, making management a complex process. Read on to learn why organizations are embracing a simplified cloud-delivered endpoint security approach.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Endpoint Detection and Response (EDR) for Hybrid Deployments
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Endpoint Detection and Response (EDR), designed to provide faster end-to-end response and remediation through accelerated threat hunting with continuous endpoint visibility.
Posted: 29 Apr 2020 | Published: 29 Apr 2020

VMware International Unlimited Company

Decisive Technology for Decisive Moments
sponsored by Thales
WHITE PAPER: Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Secure Remote Access for Employees
sponsored by Thales
WHITE PAPER: In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

You don't get a pass on Cybersecurity: Webinar
sponsored by eSentire
WEBCAST: In this webinar, Mark Sangster discusses how the COVID-19 crisis is affecting businesses and individuals and the need to stay vigilant.
Posted: 23 Apr 2020 | Premiered: Apr 23, 2020

eSentire
1 - 25 of 588 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info