IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 598 Matches Previous Page  |  Next Page
Endpoint Protection Backup ENCIS Case Study
sponsored by Carbonite
CASE STUDY: Dive into this case study to see how one leading vendor was able to offer ENCIS the endpoint protection platform they needed just in time to protect them from having their data stolen during a robbery and why it may be time for your organization to prepare for similar risks.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Carbonite

Endpoint Protection Backup ENCIS Case Study
sponsored by Carbonite
CASE STUDY: Access this case study to learn how Carbonite Endpoint was able to save ENCIS’s data despite suffering stolen workstations and see why it may be time for your organization to prepare for similar risks.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Carbonite

How to Protect Your Organization with Managed Threat Detection and Response
sponsored by AT&T Cybersecurity
WEBCAST: Security is spreading its wings. SD-WAN and cloud-based security are both being adopted at a high rate, and this adoption begins with conversations about cyber risk. Because security talent is in short supply, professionals need to find ways to fend off threats. Watch this webcast for a live demo of AT&T’s Managed Threat Detection and Response.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

AT&T Cybersecurity

Vendor Comparison and Analysis: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

4 Key Tips from Incident Response Experts
sponsored by Sophos
WHITE PAPER: Today’s cyberthreats are unpredictable, so you need to make sure that you and your organization know what to do in the event of an incident. You also need to make sure you’re investing in the right technologies to detect and respond to threats. Reading these 4 tips will help you to know where you stand.
Posted: 11 Jan 2021 | Published: 09 Nov 2020

Sophos

Endpoint Security Buyers Guide
sponsored by Sophos
EGUIDE: The endpoint security market has become overpopulated with a wide variety of solutions, too many of which offer indefensible market claims about how secure they are. Read this Endpoint Security Buyers Guide to help clear up the confusion and understand what it takes to make an informed choice.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Sophos

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

EDR: The Case for Automation & Simplification
sponsored by Kaspersky Lab
WHITE PAPER: For modern organizations looking to protect their growing population of endpoints, Endpoint Detection and Response (EDR) tools are a viable option. But what is EDR, what threats does it combat, and can it be automated? Read this whitepaper to find out.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Kaspersky Lab

Ensure your Workforce's Network is Free from Threat
sponsored by Insight
WEBCAST: Tune into this webinar to hear an industry expert talk about one leading vendor’s virtual desktop platform, including features, implementation, enhanced security and more.
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Insight

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Cortex
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Cortex

What's New - Blackberry Cyber Suite
sponsored by BlackBerry
DATA SHEET: Today’s organizations are moving closer and closer to a zero-trust model, but with the power of AI, security operations centers can find even more context behind potential threats and incidents. BlackBerry’s Cyber Suite uses both, giving businesses a full spectrum of coverage, managed from a single console. Access this data sheet to learn more.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

BlackBerry

10 Experts on Active Threat Management
sponsored by GoSecure
EBOOK: The number of pervasive cyberthreats is growing larger with each passing week, which can leave security professionals feeling overwhelmed. In this e-book, hear from 10 IT security experts, including directors and C-level executives, on active threat management and data protection, and learn how you can better predict, prevent and detect attacks.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

GoSecure

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

Steps to Shift to Proactive Cyber Security
sponsored by McAfee
VIDEO: In today’s risky environment, organizations need to know if they’re adequately protected from threats in real-time. Enter proactive endpoint security. Its advanced technology lets you know if you’re protected before threats arrive. Immerse yourself in this 15-minute video to see proactive endpoint security in action!
Posted: 09 Dec 2020 | Premiered: 19 Aug 2020

McAfee

Time to Move from Reactive to Proactive Endpoint Security
sponsored by McAfee
RESOURCE: A useful new idea in software development is “shift left” – the earlier you can tackle an issue, the fewer defects you’ll have in delivery. But this philosophy can also be applied to endpoint security. Namely, acquiring knowledge of external threats can make for more accurate anticipation of them. View this article from McAfee to learn more.
Posted: 09 Dec 2020 | Published: 12 Jun 2020

McAfee

The Data-Forward Enterprise: How to Maximize Data Leverage for Better Business Outcomes
sponsored by Rubrik
WHITE PAPER: Access this white paper to learn about an IDC primary research study, commissioned by Rubrik, to determine the magnitude of the data sprawl problem, how well organizations are prepared to deal with it, and how to create a Data Management Maturity Matrix.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Rubrik

Securing the Enterprise with 360° Visibility: Don’t Leave a Gap in Defenses
sponsored by OpenText
WHITE PAPER: Organizations fight cyberthreats every day, and with more at stake than ever before, including customer data, intellectual property and company reputations, one successful attack can mean game over. This white paper demonstrates why organizations need total visibility and how endpoint detection & response (EDR) can help them achieve it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

OpenText

The 2020 Spotlight Report on Healthcare
sponsored by Vectra AI
WHITE PAPER: With the healthcare industry already being one of the most vulnerable in terms of information security and privacy, the year 2020 has been something of a nightmare. By reading this report, you can see specifically where risk has increased and how Cognito’s Network Detection and Response (NDR) can help mitigate this risk.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Vectra AI

One of the U.K.’s Largest Public Healthcare Organizations Opts in for Cisco’s Integrated Security Approach
sponsored by Cisco Systems, Inc.
CASE STUDY: One of the largest public healthcare organizations in the UK had a few challenges to tangle with: Their traditional endpoint security was ineffective, they lacked the ability to proactively hunt for threats and they were concerned with patient data privacy. How did they overcome these challenges? This case study shows how Cisco was able to help.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Cisco Systems, Inc.

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

5 Tips for Transforming Your Endpoint Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Organizations that are digitally transforming and moving to the cloud are expanding their attack surface, and as a result, they need to ensure the effectiveness of their endpoint security. What steps can you take to keep your endpoints uncompromised? Browse this Cisco white paper to examine 5 tips for transforming endpoint security.
Posted: 07 Dec 2020 | Published: 30 Sep 2020

Cisco Systems, Inc.

Securing The World’s Largest Airport With Cisco Advanced Malware Protection (AMP)
sponsored by Cisco Systems, Inc.
CASE STUDY: When we think of airport security, we often think of physical checkpoints – however, just like any other business, airports are subject to advanced cyberthreats. Read this case study to see how the Cisco helped the world’s largest airport protect itself against malware attacks.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Cisco Systems, Inc.
1 - 25 of 598 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info