IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 502 Matches Previous Page  |  Next Page
SIMPLIFY CUSTOMER ONBOARDING WITH MALWAREBYTES ONEVIEW
sponsored by Malwarebytes
WHITE PAPER: As an MSP, you need to make sure your endpoint security vendor is efficient as to not hemorrhage MRR due to complex onboarding or time-consuming client management. Access this white paper to learn how Malwarebytes’ OneView console simplifies the onboarding process, eases management, and improves customer support.
Posted: 19 Nov 2021 | Published: 19 Nov 2021

Malwarebytes

WHY MSPs ARE MAKING THE SWITCH TO MALWAREBYTES
sponsored by Malwarebytes
WHITE PAPER: MSPs are only as trustable as their endpoint protection and ransomware capabilities—which is why so many MSPs are considering Malwarebytes’ endpoint protection and resiliency. Read on to learn what sets Malwarebytes apart from the competition and see why customers are rating their services above the industry average, according to one analyst group.
Posted: 18 Nov 2021 | Published: 18 Nov 2021

Malwarebytes

G2 2021 Fall Report ENDPOINT MANAGEMENT SOFTWARE
sponsored by Absolute Software Corporation
RESEARCH CONTENT: Endpoint management software products help users keep track of devices in a system and ensure their software is secure and up to date. Download this exclusive grid report from G2, the world’s leading business software review platform, to unlock insights into endpoint management best practices, necessary capabilities, and more.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Absolute Software Corporation

Watchguard Advanced Endpoint Security Unlock Your Managed Security Services Growth
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Small and medium businesses are at a high risk in today’s world of automated, intelligent hacking. And with remote work being more popular than ever, endpoint security is crucial. Read on to learn how the WatchGuard Endpoint Security portfolio helps MSPs predict, prevent, and respond to security threats of any kind.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

WatchGuard Technologies, Inc.

The Intelligent Edge: A Faster, More Efficient Way to Manage Your IT Risk
sponsored by Tanium
WHITE PAPER: Endpoints connect your organization’s two most important assets: people and data. Tanium’s “Intelligent Edge” is a process designed to manage your endpoint devices and maximize your IT resources. This guide will help you gain the speed, visibility and insights to survive and thrive in this new era of remote work and pervasive cybercrime.
Posted: 02 Jul 2021 | Published: 02 Jul 2021

Tanium

Malwarebytes Integration with Datto RMM
sponsored by Malwarebytes
DATA SHEET: For MSPs, when there’s a business opportunity to offer effective endpoint protection to new customers, timely development is key. Malwarebytes and Datto have joined forces to create an integrated solution to deliver just that. Access this data sheet for an overview of the joint solution including its key capabilities and use cases.
Posted: 25 Jun 2021 | Published: 25 Jun 2021

Malwarebytes

The Total Economic Impact™Of Deep Instinct
sponsored by Deep Instinct
ANALYST BRIEF: This Forrester Total Economic Impact report provides an exclusive insider look at the features, tangible benefits and 3-year financial impact of Deep Instinct – gathered through 4 customer interviews and data aggregation. Read on to access the full report.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

Deep Instinct

Ten Signs It’s Time to Review Your Endpoint Protection Guide
sponsored by BlackBerry
RESOURCE: The ongoing trend of successful cyberattacks continues to illustrate that current cybersecurity practices and solutions may not be able to keep pace with sophisticated and evolving modern threats. Download this guide to learn the 10 signs that indicate it's time to review and reevaluate your endpoint protection.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

BlackBerry

Replacing Legacy AV
sponsored by BlackBerry
DATA SHEET: Sophisticated new threats are outpacing organizations relying on a legacy antivirus solution. As these threats evolve, enterprises need security that can keep up. BlackBerry Cyber Suite is an AI-based platform that can help increase defenses dramatically. Learn more in this solution brief.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

BlackBerry

eSentire MDR with Microsoft Defender for Endpoint
sponsored by eSentire
DATA SHEET: With today’s cybersecurity threats having become so pervasive, and with security talent in short supply, organizations are turning to managed threat detection that scans over multiple tiers without increasing complexity. Examine this data sheet to explore eSentire Managed Detection and Response (MDR) with Microsoft Defender for Endpoint.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

eSentire

IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment
sponsored by BlackBerry
ANALYST REPORT: In the IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment, BlackBerry was positioned as a leader of UEM software technology. Read this report to learn more about why BlackBerry was named a Leader.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

BlackBerry

Visibility Gap Study
sponsored by Tanium
WHITE PAPER: Download this whitepaper to learn more about the five key challenges for IT in 2020 that this survey uncovered.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Tanium

Strained Relationships Between Security And It Ops Teams Leave Businesses At Risk
sponsored by Tanium
ANALYST REPORT: Tanium commissioned Forrester Consulting to survey more than 400 IT leaders at large enterprises to uncover the challenges and consequences they face when managing and securing their endpoints. Download the study to uncover the results.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Tanium

How a Wine and Spirits Distributor Protects its Data and Reputation with Threat Hunting
sponsored by Cisco Secure
CASE STUDY: Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.
Posted: 22 Mar 2021 | Published: 11 Feb 2021

Cisco Secure

Marine Credit Union Bolsters Their Security with Cisco
sponsored by Cisco Secure
CASE STUDY: Marine Credit Union had a tough mission in front of them: Build top-notch security on a budget. They had to defend their highly targeted data against online criminals and nation states with the goal of safeguarding their members’ financial information. View this case study to discover how Cisco helped Marine Credit Union achieve their goal.
Posted: 22 Mar 2021 | Published: 16 Feb 2021

Cisco Secure

Malwarebytes Video
sponsored by Malwarebytes
WEBCAST: To address today’s realities, organizations must plan for and deploy strategies to support remote worker cyber resilience. There are specific protocols that must be followed in the event of an attack, and with careful and diligent planning, you can significantly lower cyber risk. Watch this webinar to learn best practices for a secure workforce.
Posted: 10 Mar 2021 | Premiered: Mar 10, 2021

Malwarebytes

Automated Endpoint Incident Response: An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Explore the current market influences that impact the need for automated cyber response and the key methods that can be adopted to compress response times.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Malwarebytes

G2 2021 Winter Report
sponsored by Absolute Software Corporation
ANALYST REPORT: The Winter 2021 Grid Report for Endpoint Management in collaboration with Absolute Software helps you choose the right partner for endpoint management. Download the report to get started.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Absolute Software Corporation

Case Study: Archdiocese
sponsored by Bitdefender
CASE STUDY: The Archdiocese isn’t typically renowned for their IT and cybersecurity skills. However, in this case study, they partnered with Bitdefender to integrate MDR capabilities as part of a project to consolidate time spent on security operations and enable their IT staff to focus on strategic initiatives. Read on to unlock the full story.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Bitdefender

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Endpoint Prevention and Response: Comparative Report
sponsored by Palo Alto Networks
ANALYST REPORT: Businesses are using endpoint prevention and response (EPR) to detect, prevent, analyze and respond to targeted attacks such as advanced persistent threats (ATPs). In this AV Comparatives report, study a comparison of 9 different EPR platforms and examine whether they took an active or passive response to threats.
Posted: 22 Jan 2021 | Published: 17 Dec 2020

Palo Alto Networks

The Forrester Wave: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Networks

8 Top Cybersecurity Challenges
sponsored by IronNet
EBOOK: Working with leading companies across various sectors, IronNet has identified the shared security pain points of organizations. By studying this e-book, you can learn 8 of the top cybersecurity challenges faced today, and, you can understand how network detection and response (NDR) can help to mitigate some of these challenges.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

IronNet

Quocirca: Selecting a cloud printing platform
sponsored by ComputerWeekly.com
RESOURCE: As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

ComputerWeekly.com
1 - 25 of 502 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences