IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 558 Matches Previous Page  |  Next Page
Mobile Security Case Study
sponsored by Symantec
CASE STUDY: Your business could not survive without users being empowered by mobile technology. Yet one quarter of organizations have been affected by a security breach that has either resulted in lost data or downtime. In this resource, learn how Symantec is helping 3 companies overcome their mobile endpoint protection challenges.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec

Choosing the Right Endpoint Security Controls for your Security Lifecycle
sponsored by Symantec
ANALYST REPORT: In the modern world of cloud-enabled digital transformation initiatives, endpoint security has gained importance. Download this report for key points to consider when evaluating endpoint security software such as endpoint protection and endpoint detection and response.
Posted: 21 Aug 2019 | Published: 30 Apr 2019

Symantec

The Secrets to BYOD Revealed
sponsored by Teleware
WHITE PAPER: Jump into this guide to find out to maintain a happy, engaged, and secure BYOD mobility strategy without all of the aches and pains. Plus, hear from real world IT and business leaders as they recap the trials and tribulations of their own BYOD experiences.
Posted: 19 Aug 2019 | Published: 19 Aug 2019

Teleware

Top 10 Security Changes in Red Hat Enterprise Linux 8
sponsored by Red Hat
WEBCAST: In this webinar, see an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
Posted: 16 Aug 2019 | Premiered: Aug 16, 2019

Red Hat

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

Expanding Machine Learning Applications on the Endpoint
sponsored by Blackberry Cylance
RESEARCH CONTENT: Endpoint detection and response (EDR) has emerged as a key component of an endpoint security strategy. But according to recent research, customers believe there is still opportunity for improvements in EDR. Download this report to learn about the current EDR approaches taken and how machine learning can benefit EDR.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Blackberry Cylance

How to Pick a Winner in EDR
sponsored by Palo Alto Networks
ANALYST REPORT: The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading endpoint detection and response (EDR) products against real-world attack sequences. This research report will break down the results and what it means for your organization as you assess your endpoint security toolkit.
Posted: 12 Aug 2019 | Published: 21 Jun 2019

Palo Alto Networks

Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

Mobile Security in the Financial Services
sponsored by Wandera
WHITE PAPER: Download this report for an overview of mobile security challenges facing modern Financial Services companies, including changing technologies and compliance with government regulations, as well as an in-depth analysis of how mobile cyber threats impact the industry.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Wandera

Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
sponsored by Forcepoint
WEBCAST: In this webcast, Bharath Vasudevan from Forcepoint discusses how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment. The webcast will also explore how Forcepoint's solution, Dynamic Data Protection, delivers risk-adaptive protection.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

Forcepoint

The Future of Cybercrime and Security
sponsored by Webroot
ANALYST REPORT: In Juniper Research's The Future of Cybercrime & Security report, explore key takeaways and an overview of the network & endpoint cybersecurity competitive landscape.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

Business Endpoint Protection
sponsored by Webroot
EBOOK: Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Webroot

A Quick Guide to Stopping Ransomware
sponsored by Webroot
RESOURCE: In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Webroot

Testing Security Effectiveness with the MITRE ATT&CK™ Framework
sponsored by Cymulate
PRODUCT OVERVIEW: The MITRE ATT&CK framework has gained traction thanks to its comprehensive mapping of adversary tactics and techniques used to infiltrate a network, compromise systems and act on malicious threat actor objectives. In this solution brief, learn how Cymulate can help organizations model threat simulations with the MITRE ATT&CK Framework.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Cymulate

Gaining a Strategic Endpoint Security Advantage in the Era of Advanced Threats
sponsored by Symantec
WHITE PAPER: Today's advanced threat landscape poses serious challenges for enterprises of any size. But the rising trend of attacks directed against midsized enterprises should bring security to the forefront of business planning for these organizations. In this report, learn how machine learning and AI can help in the fight against advanced threats.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Symantec

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

4 Steps to Help You Practice for the CISSP exam
sponsored by TechTarget
RESOURCE: Are you ready for the CISSP exam? Your free CISSP prep guide awaits. Add your unique insights to our market research program to access your free PDF download and become one step closer to earning your certification!
Posted: 16 Jul 2019 | Published: 12 Jun 2019

TechTarget

Evaluating Endpoint Antimalware Protection Software
sponsored by TechTarget
RESOURCE: With millions of different kinds of malware in the wild and with cyberattacks on the rise, one hypercritical issue for organizations of any size is to ensure strong protection against malware. Participate in our Endpoint Security survey to gain access to our exclusive e-book which compares popular antimalware protection software.
Posted: 13 Jul 2019 | Published: 03 Aug 2019

TechTarget

Go Beyond Next-Gen IPS
sponsored by Trend Micro, Inc.
WHITE PAPER: Organizations have relied on next-gen IPS to detect and block threats at wire speed. But with the first next-gen IPS arriving on the scene more than a decade ago, at what point does "next generation" become "current generation"? In this white paper, learn why enterprises can no longer solely rely on a next-gen IPS to protect their networks.
Posted: 11 Jul 2019 | Published: 31 May 2018

Trend Micro, Inc.

How the University of Sunderland Simplified and Enables Mobility and BYOD
sponsored by Ignition Technology Ltd
CASE STUDY: The University of Sunderland was looking for a platform that assured users are who they say they are while still being incredibly easy to use for all members of the university community. In this case study, learn how Duo allowed the university to do this while reducing the impact of cyberattacks.
Posted: 09 Jul 2019 | Published: 09 Jul 2019

Ignition Technology Ltd

Lenovo ThinkShield Solutions Guide
sponsored by Lenovo
WHITE PAPER: It's time to act before your next attack, read this Lenovo ThinkShield Solutions Guide to find out what to do next.
Posted: 02 Jul 2019 | Published: 02 Jul 2019

Lenovo

Surviving Today's Onslaught of PC Security Threats
sponsored by Lenovo
EBOOK: 54% of companies think their data, devices and employees are secure, but Lenovo research shows many are not responding to threats the right way. Find out if you're at risk today.
Posted: 02 Jul 2019 | Published: 02 Jul 2019

Lenovo

Top 10 Mobile Deployment Tips for 2019
sponsored by Vox Mobile Solutions
WHITE PAPER: Read through 2019's top 10 mobile deployment tips to keep up to speed with the latest enterprise mobility trends – and get tips on how to streamline your budget, employee satisfaction, and management responsibilities along the way
Posted: 01 Jul 2019 | Published: 01 Jul 2019

Vox Mobile Solutions

Explore the ROI of CylancePROTECT and CylanceOPTICS
sponsored by Blackberry Cylance
WHITE PAPER: To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
Posted: 26 Jun 2019 | Published: 31 May 2019

Blackberry Cylance

The Digital Workspace: 3 Elements of Success
sponsored by Citrix
WHITE PAPER: When it comes to managing the digital workspace, IT leaders overwhelmingly selected security as the top challenge. However, when managed properly, the right cloud-based digital workspace can keep organizations secure. In this white paper, learn how a unified Citrix experience can help organizations expand their security.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Citrix
1 - 25 of 558 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement