IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 589 Matches Previous Page  |  Next Page
eSentire MDR with Microsoft Defender for Endpoint
sponsored by eSentire
DATA SHEET: With today’s cybersecurity threats having become so pervasive, and with security talent in short supply, organizations are turning to managed threat detection that scans over multiple tiers without increasing complexity. Examine this data sheet to explore eSentire Managed Detection and Response (MDR) with Microsoft Defender for Endpoint.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

eSentire

IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment
sponsored by BlackBerry
ANALYST REPORT: In the IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment, BlackBerry was positioned as a leader of UEM software technology. Read this report to learn more about why BlackBerry was named a Leader.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

BlackBerry

Introducing MVISION Insights
sponsored by McAfee
VIDEO: Now more than ever, security teams must get ahead of adversaries and their threat campaigns. View this short video for an overview and demo of endpoint security with McAfee MVISION Insights – an analytics platform that strives to prioritize threats that matter, predict the impact and prescribe improvements before the threat occurs.
Posted: 14 Apr 2021 | Premiered: 20 Jul 2020

McAfee

Peril In A Pandemic: The State Of Mobile Application Security
sponsored by Synopsys
ANALYST REPORT: Mobile downloads spiked in 2020, which means that mobile apps now carry a much heavier risk profile. In turn, the Synopsys Cybersecurity Research Center analyzed the vulnerabilities of 3,335 of the most popular apps on the Google Play Store as of Q1, 2021. View this report to learn their findings.
Posted: 12 Apr 2021 | Published: 31 Mar 2021

Synopsys

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: After Gartner re-examined its 2020 forecast in the wake of the pandemic, analysts now recommend securing the remote workforce as a top priority for enterprises. In fact, password security and remote access for employees are areas that need to be addressed first. Learn more about what security experts and analysts recommend in our new guide.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

TechTarget

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: After Gartner re-examined its 2020 forecast in the wake of the pandemic, analysts now recommend securing the remote workforce as a top priority for enterprises. In fact, password security and remote access for employees are areas that need to be addressed first. Learn more about what security experts and analysts recommend in our new guide.
Posted: 29 Mar 2021 | Published: 02 Apr 2021

TechTarget

Visibility Gap Study
sponsored by Tanium
WHITE PAPER: Download this whitepaper to learn more about the five key challenges for IT in 2020 that this survey uncovered.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Tanium

Challenge the Rules of Security: Transform the Threat Surface to Proactive Control
sponsored by Google Chrome OS
VIDEO: Watch now to learn how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
Posted: 24 Mar 2021 | Premiered: 12 Mar 2021

Google Chrome OS

Strained Relationships Between Security And It Ops Teams Leave Businesses At Risk
sponsored by Tanium
ANALYST REPORT: Tanium commissioned Forrester Consulting to survey more than 400 IT leaders at large enterprises to uncover the challenges and consequences they face when managing and securing their endpoints. Download the study to uncover the results.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Tanium

Webinar: 3 Ways to Improve Your SCCM Environment
sponsored by HCL Software
VIDEO: In this detailed webinar, review 3 ways to improve your SCCM management using BigFix Endpoint Management platform.
Posted: 22 Mar 2021 | Premiered: 22 Mar 2021

HCL Software

How A Wine And Spirits Distributor Protects Its Data And Reputation With Threat Hunting
sponsored by Cisco Systems, Inc.
CASE STUDY: Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.
Posted: 22 Mar 2021 | Published: 11 Feb 2021

Cisco Systems, Inc.

Marine Credit Union Bolsters Their Security With Cisco
sponsored by Cisco Systems, Inc.
CASE STUDY: Marine Credit Union had a tough mission in front of them: Build top-notch security on a budget. They had to defend their highly targeted data against online criminals and nation states with the goal of safeguarding their members’ financial information. View this case study to discover how Cisco helped Marine Credit Union achieve their goal.
Posted: 22 Mar 2021 | Published: 16 Feb 2021

Cisco Systems, Inc.

Threat Hunting With Securex
sponsored by Cisco Systems, Inc.
EBOOK: The world has been at least partially remote for almost a year now, and while security teams have taken bolder defensive measures, security that is merely reactive won’t be able to stop increasingly complex cyber threats. Dive into this interactive e-book to get a look at Cisco SecureX, which strives to disrupt attacks before they materialize.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Cisco Systems, Inc.

Automated Endpoint Incident Response - An Enterprise Guide
sponsored by Malwarebytes
WHITE PAPER: Placeholder
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Best Practice Makes Perfect: Malware Response In The New Normal
sponsored by Malwarebytes
WHITE PAPER: In this eguide, read through several key findings about cyber security and incident response. Develop an understanding of some malware response best practies, and review some final conclusions when it comes to defending against cyber attacks.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Advancing SOC Endpoint Incident Response Practices
sponsored by Malwarebytes
WHITE PAPER: Placeholder
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

5 Steps To Secure Your Remote Workforce - A Practical Guide
sponsored by Malwarebytes
EBOOK: Placeholder
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Enduring From Home - COVID-19’s Impact On Business Security
sponsored by Malwarebytes
WHITE PAPER: In this eguide, walk through the impact Covid-19 has had on business security, and gain insight into some key takeaways about the changing landscape of security.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Kraft Heinz Scales and Automates Global Endpoint Incident Response
sponsored by Malwarebytes
CASE STUDY: In this eguide, read through a case study of Kraft Heinz, and how they adopted endpoint indicent response to solve challenges they faced.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Malwarebytes Incident Response
sponsored by Malwarebytes
DATA SHEET: In thie eguide, read about Malwarebytes Incident Response, and why the time it takes to erradicate a potential threat is extremely important to avoiding serious data breaches.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Malwarebytes Remediation for CrowdStrike
sponsored by Malwarebytes
DATA SHEET: Placeholder
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Malwarebytes

Protecting data and simplifying IT management with Chrome OS
sponsored by Google Chrome OS
WHITE PAPER: Traditional endpoint security is a zero-sum game. The threats are constantly growing and so are the costs. Protecting endpoints is one of the greatest challenges faced by cybersecurity and IT operations professionals. It's time to rethink the model with Chrome OS.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Google Chrome OS

Taegis XDR
sponsored by Dell SecureWorks
VIDEO: In this 9-minute demo, learn about Secureworks Taegis XDR. It combines the power of human intellect with security analytics to unify detection and response across the entire ecosystem – cloud, endpoint, and network – for improved security outcomes and more efficient security operations.
Posted: 16 Mar 2021 | Premiered: 16 Mar 2021

Dell SecureWorks
1 - 25 of 589 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences