IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 609 Matches Previous Page  |  Next Page
How EDR Offers Threat Detection, Insights, and Remediation
sponsored by Malwarebytes
WHITE PAPER: Establishing an effective endpoint detection and response (EDR) platform can be an organization’s best defense against rampant malware and ransomware attacks. Read this white paper to learn more about EDR, including how it compares to traditional endpoints security and how it stands up to ransomware.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

Malwarebytes

Watchguard Advanced Endpoint Security Unlock Your Managed Security Services Growth
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Small and medium businesses are at a high risk in today’s world of automated, intelligent hacking. And with remote work being more popular than ever, endpoint security is crucial. Read on to learn how the WatchGuard Endpoint Security portfolio helps MSPs predict, prevent, and respond to security threats of any kind.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

WatchGuard Technologies, Inc.

Kaspersky Endpoint Security for Business
sponsored by Kaspersky Lab
DATA SHEET: Endpoint security has become a strategic imperative as organizations incorporate endpoints across nearly every business function. Access this data sheet for a closer look at the key features and capabilities of Kaspersky Endpoint Security for Business, designed to balance protection, performance and cost-savings.
Posted: 07 Jul 2021 | Published: 07 Jul 2021


The Intelligent Edge: A Faster, More Efficient Way to Manage Your IT Risk
sponsored by Tanium
WHITE PAPER: Endpoints connect your organization’s two most important assets: people and data. Tanium’s “Intelligent Edge” is a process designed to manage your endpoint devices and maximize your IT resources. This guide will help you gain the speed, visibility and insights to survive and thrive in this new era of remote work and pervasive cybercrime.
Posted: 02 Jul 2021 | Published: 02 Jul 2021

Tanium

Malwarebytes Integration with Datto RMM
sponsored by Malwarebytes
DATA SHEET: For MSPs, when there’s a business opportunity to offer effective endpoint protection to new customers, timely development is key. Malwarebytes and Datto have joined forces to create an integrated solution to deliver just that. Access this data sheet for an overview of the joint solution including its key capabilities and use cases.
Posted: 25 Jun 2021 | Published: 25 Jun 2021

Malwarebytes

HOW UES PROTECTS SHIFTING WORK ENVIRONMENTS.
sponsored by BlackBerry
RESEARCH CONTENT: New security challenges stemming from the 2020 pandemic have heightened requirements for a unified endpoint security (UES) solution at many organizations. Read this report to unlock exclusive research into the endpoint security landscape, the impact of remote work, use cases for UES, and more.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

BlackBerry

The Total Economic Impact™Of Deep Instinct
sponsored by Deep Instinct
ANALYST BRIEF: This Forrester Total Economic Impact report provides an exclusive insider look at the features, tangible benefits and 3-year financial impact of Deep Instinct – gathered through 4 customer interviews and data aggregation. Read on to access the full report.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

Deep Instinct

AppGuard Defeats Polymorphic Malware Attack, Prevents Spread to other Systems Protects Against Future Zero- Day Attacks
sponsored by AppGuard
WHITE PAPER: In 2019, the Mahnomen County Sheriff’s Office was hit by a malware attack. It moved quickly, immobilizing activities and rapidly jumping from computer to computer. Take a quick survey to access more about the Mahnomen County Sheriff’s Office attack and cybersecurity solutions that defends against new, emerging, and unique attacks.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Prevent Zero- Day Attacks with The Right Defense
sponsored by AppGuard
QSO INCENTIVE: Complete a brief survey to access this white paper outlining the zero-day attack threat and why traditional endpoint protection tools are ineffective at protecting against them. Find out how the Microsoft Exchange Server attack unfolded and the steps you can take to prevent becoming a victim to zero-day attacks.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Endpoint Protection for Small to Medium Business
sponsored by AppGuard
WHITE PAPER: Just because you’re a smaller sized company, doesn’t mean you’re safe. According to Ponemon Institute, 63% of SMBs experienced a data breach in 2019. Luckily, this excerpt will explain how you can gain the endpoint protection you need to disrupt malware before it causes harm.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Endpoint Protection for Small to Medium Business
sponsored by AppGuard
WHITE PAPER: Just because you’re a smaller sized company, doesn’t mean you’re safe. According to Ponemon Institute, 63% of SMBs experienced a data breach in 2019. Luckily, this excerpt will explain how you can gain the endpoint protection you need to disrupt malware before it causes harm.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Exploring the State of Malware 2021
sponsored by Malwarebytes
EBOOK: PH
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Malwarebytes

When stress meets security
sponsored by Malwarebytes
EBOOK: PH
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Malwarebytes

Essentials for Securing your Remote Worker Video
sponsored by Malwarebytes
WEBCAST: PH
Posted: 07 Jun 2021 | Premiered: Jun 7, 2021

Malwarebytes

Fidelis - Executive Summary
sponsored by Fidelis
DATA SHEET: Fidelis Elevate is an Active XDR platform built to help security teams quickly detect, hunt and respond to inbound and insider threats as well as data theft. Inside this executive summary, learn how Fidelis Network, Fidelis Endpoint, and Fidelis Deception all makeup the active XDR platform.
Posted: 17 May 2021 | Published: 17 May 2021

Fidelis

Enhancing Visibility, Coverage and Context
sponsored by Redscan
WEBCAST: Learn what the changing landscape means for the security of your business and why next-generation endpoint security can help identify and respond to malicious activity as early as possible.
Posted: 07 May 2021 | Premiered: May 7, 2021


Ten Signs It’s Time to Review Your Endpoint Protection Guide
sponsored by BlackBerry
RESOURCE: The ongoing trend of successful cyberattacks continues to illustrate that current cybersecurity practices and solutions may not be able to keep pace with sophisticated and evolving modern threats. Download this guide to learn the 10 signs that indicate it's time to review and reevaluate your endpoint protection.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

BlackBerry

Replacing Legacy AV
sponsored by BlackBerry
DATA SHEET: Sophisticated new threats are outpacing organizations relying on a legacy antivirus solution. As these threats evolve, enterprises need security that can keep up. BlackBerry Cyber Suite is an AI-based platform that can help increase defenses dramatically. Learn more in this solution brief.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

BlackBerry

eSentire MDR with Microsoft Defender for Endpoint
sponsored by eSentire
DATA SHEET: With today’s cybersecurity threats having become so pervasive, and with security talent in short supply, organizations are turning to managed threat detection that scans over multiple tiers without increasing complexity. Examine this data sheet to explore eSentire Managed Detection and Response (MDR) with Microsoft Defender for Endpoint.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

eSentire

IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment
sponsored by BlackBerry
ANALYST REPORT: In the IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment, BlackBerry was positioned as a leader of UEM software technology. Read this report to learn more about why BlackBerry was named a Leader.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

BlackBerry

VIB Endpoint Security Effectiveness Survey
sponsored by Illumio
WHITE PAPER: This report summarizes the results of over 450 IT and Security professionals conducted by Virtual Intelligence Bureau (ViB) to understand how organizations protect their endpoints against ransomware and malware. Download the report for insights into respondents current endpoint security efforts and the critical gap that needs to be addressed.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Illumio

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: After Gartner re-examined its 2020 forecast in the wake of the pandemic, analysts now recommend securing the remote workforce as a top priority for enterprises. In fact, password security and remote access for employees are areas that need to be addressed first. Learn more about what security experts and analysts recommend in our new guide.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

Quocirca: Selecting a cloud printing platform
sponsored by ComputerWeekly.com
RESOURCE: As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

ComputerWeekly.com
1 - 25 of 609 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences