IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 554 Matches Previous Page  |  Next Page
Firewalls and the Cloud: Survey Results
sponsored by Barracuda
WHITE PAPER: Next Generation Firewalls (NGFs) were intended to address the headaches that accompany expanding perimeters, but are they able to keep pace with increasingly complex network and system topologies? Flip through the results of a survey of over 600 IT security decision makers to get a firsthand glimpse into the reality of cloud security and NGFs.
Posted: 17 Apr 2019 | Published: 31 Mar 2018

Barracuda

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

Why Enterprise Anti-Virus Isn't Working
sponsored by Ziften
RESOURCE: The name itself, anti-virus, betrays the inadequacy of the enterprise AV threat model. In this blog, learn more a new and improved next generation anti-virus (NGAV) which generally incorporates behavior analytics, cloud-based delivery, machine learning and artificial intelligence, and more automated response.
Posted: 15 Apr 2019 | Published: 09 Apr 2019

Ziften

Artificial Intelligence (AI) in Cybersecurity: Stopping Fileless Attacks
sponsored by Ziften
RESOURCE: AI has a growing role in cybersecurity as AI-based cybersecurity systems are outperforming traditional antivirus software. AI security models are proving to be particularly effective in defending endpoints against "fileless" attacks. In this blog, learn more about fileless attacks and how to defend against them.
Posted: 15 Apr 2019 | Published: 09 Oct 2018

Ziften

A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
RESEARCH CONTENT: To understand exactly how organizations are addressing technology-based disruption, Tanium commissioned a study of business decision-makers, CIOs and CISOs. Download this report to discover key results including how to keep complex systems running smoothly and defend them against the range of threats plaguing modern businesses.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Tanium

FUJITSU PalmSecure for Mobile Devices
sponsored by TechData - Fujitsu
PRODUCT OVERVIEW: Learn about FUJITSU PalmSecure and how their palm vein imaging technology can be used for secure identification and authentication on mobile endpoints in your organization.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

TechData - Fujitsu

Top 3 Causes of Endpoint Security Failure
sponsored by Comodo
RESOURCE: Endpoint security has been radically redefined in recent years making it essential that organizations rethink and rearchitect how they prevent cybercriminals. This paper looks at 3 major reasons for endpoint security failure, why solving the problem is becoming more difficult and where to look for endpoint security platforms.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Comodo

Endpoint Protection Buyer Guide
sponsored by CrowdStrike
WHITE PAPER: Endpoint security is one of the most critical components of a cybersecurity strategy. Unfortunately, for those responsible for protecting their organizations' endpoints, it has never been more challenging to select the best solution for the job. In this white paper, discover an evaluation of endpoint protection platforms based on 5 key elements.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

CrowdStrike

DoD is Doubling Down on Mobile Endpoint Security
sponsored by Samsung Electronics
NEWSLETTER: In this article, find strategies the DoD — and all federal agencies — should consider as they look to harden defenses and modernize their cybersecurity approaches and discover how Samsung's government technology can assist agencies with their digital transformation.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Samsung Electronics

How Does Security Fit Into Your IoT Strategy?
sponsored by Samsung Electronics
NEWSLETTER: IoT devices can pose as unsecured portals for three main reasons. In this article, find out what these reasons are and how your organization can implement and protect mobile devices in every ecosystem.
Posted: 27 Mar 2019 | Published: 26 Nov 2018

Samsung Electronics

Lessons From 2018: Handling the Next Mobile Security Breach
sponsored by Samsung Electronics
NEWSLETTER: The past year hosted a new volume and variety of threats to enterprise devices and the Android OS platform. How can enterprises adapt to protect their mobile devices in 2019? Read on to find out.
Posted: 27 Mar 2019 | Published: 26 Dec 2018

Samsung Electronics

MFP Security Guide
sponsored by Kyocera Document Solutions UK
WHITE PAPER: Multi-function printers (MFPs) have become a cybersecurity blind spot within many organizations. This white paper offers practical guidance for IT professionals to harness the built-in security features of leading MFPs and adopt further, enhanced data protection capabilities. Read on to learn more.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Kyocera Document Solutions UK

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Understanding the Mobile Threat Landscape
sponsored by Wandera
WHITE PAPER: 2019 should be another momentous year for mobile security, with cyberattacks growing rapidly in sophistication and distribution. In this report, uncover the key mobile security trends that emerged last year as well as a summary of predictions for the mobile threat landscape for the year ahead.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Wandera

Evolving Security Drivers in the UK Public Sector
sponsored by Kyocera Document Solutions UK
RESOURCE: There is an increased appetite for more secure print and document management processes. Even public sector organizations with a good grasp of the security challenges facing their print estates have a hard time knowing how secure each device is. In this article, learn how KYOCERA's Secure MFP can help mitigate the risks of threats and attacks.
Posted: 21 Mar 2019 | Published: 06 Apr 2018

Kyocera Document Solutions UK

The Managed Print Services Market
sponsored by Kyocera Document Solutions UK
RESOURCE: Security is a major concern for financial organizations due to the volume of sensitive personal data flowing in and out on a daily basis. It is essential for financial organizations to evaluate their print security. In this article, learn more about why security matters in the managed print services market, especially in the financial sector.
Posted: 20 Mar 2019 | Published: 06 Jul 2018

Kyocera Document Solutions UK

Case Study Global Airline
sponsored by AppGuard
CASE STUDY: This major global airline needed to enhance their security measures, as a cyberattack could jeopardize passenger lives, harm reputation and revenue. Download this case study to find out how they saw success with AppGuard's endpoint protection tools.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

AppGuard

Endpoint Zero Trust Protection in a Connected World
sponsored by AppGuard
RESOURCE: In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

AppGuard

Automotive Leader Drives Environmental Gains with Managed Print Services
sponsored by HP
CASE STUDY: Download this case study to learn how managed print services were the key to helping one company realize a 56% annual reduction in energy use for printing, and paper reductions equivalent to saving 47 acres.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

HP

Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Secure Print Services Are Key to Digital Transformation
sponsored by HP
RESOURCE: Today's digital technologies mean every device connected to the network is potentially an endpoint security risk—including printers and print infrastructure. In this article, learn how to protect your print environment from threats.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

DreamWorks Animation Applies HP Inc.'s Expertise and Experience to Reinforce Print and Document Security
sponsored by HP
CASE STUDY: In this case study, learn how a large film production studio, DreamWorks Animation, partnered with HP Inc. to address its print security needs. The case study also provides recommendations for addressing your organization's printer security needs.
Posted: 13 Mar 2019 | Published: 31 Mar 2018

HP

Security and Efficiency Benefits Realized With HP MPS and HP Access Control
sponsored by HP
CASE STUDY: Security experts are advising and clients are demanding that law firms protect their confidential data with the highest level of IT security solutions. In this case study, learn how one legal firm chose to enhance print management and security through a HP Managed Print Services solution.
Posted: 13 Mar 2019 | Published: 31 Jan 2017

HP
1 - 25 of 554 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement