IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by, powered by an online computer dictionary
Endpoint Security Reports
1 - 25 of 780 Matches Previous Page  |  Next Page
Data Architecture for IoT Communications and Analytics
sponsored by Hortonworks
RESOURCE: Inside, explore a checklist of fundamental aspects of the data architecture that is necessary for IoT success, and examine what is required to enable an environment that can rapidly adapt to the dynamic nature of massive numbers of connected sensors and other end-point devices.
Posted: 23 May 2018 | Published: 23 May 2018


A New Era in Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: Find out how you can devise a prevention and detection strategy that goes beyond signature detection and predicts an attacker's movements before they become impactful.
Posted: 17 May 2018 | Published: 31 May 2017


Keep Point-of-Sale Data Safe on All Sides
sponsored by HPI and Intel
WHITE PAPER: Technologies today capture more and more valuable customer data than ever before. Take a look at this white paper to uncover how to keep point-of-sale data safe with a multi-level protection strategy.
Posted: 17 May 2018 | Published: 17 May 2018

HPI and Intel

Where to Invest Next: Guidance for Maturing Cyber Defenses
sponsored by CrowdStrike
WHITE PAPER: Take a look at the security staffing, processes and technologies that are common to most mature and maturing organizations.
Posted: 16 May 2018 | Published: 16 May 2018


Sifting Through Endpoint Security Hype and Reality
sponsored by NSS Labs
WHITE PAPER: Access this 13-page NSS Labs white paper to gain a better understanding of the newer classes of endpoint detection and response (EDR) and advanced endpoint protection (AEP) products. Determine what endpoint tools are best for your enterprise security needs.
Posted: 16 May 2018 | Published: 16 May 2018

NSS Labs

Cloud Best Practices: Audit Checklist for Endpoint Security
sponsored by MobileIron
WHITE PAPER: This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint.
Posted: 15 May 2018 | Published: 15 May 2018


The Cloud is the Future of Endpoint Security
sponsored by Carbon Black
VIDEO: In this video Q&A, learn from the industry's leading experts, Peter Firstbrook, Research Vice President at Gartner and Mike Viscuso, Co-Founder and CTO at Carbon Black as they discuss how the cloud and big data are poised to solve the challenges that persist in endpoint cybersecurity today.
Posted: 15 May 2018 | Premiered: 15 May 2018

Carbon Black

CISSP Protection Planning Guide
sponsored by QSO Surveys APAC
RESOURCE: A recent TechTargetsurvey shows that IT and security pros are concerned about undetected threats, false alerts, and data breaches with their current endpoint protection. Explore endpoint security methods and technology options through our Endpoint Protection Planning Guideto create a protection plan that works for you.
Posted: 14 May 2018 | Published: 14 May 2018

Five steps to executing a mobile threat defense strategy
sponsored by MobileIron
WHITE PAPER: Download this five-step guide to help you design a best-practice strategy that delivers actionable intelligence and immediate protection against advanced mobile threats that target your mobile workforce.
Posted: 14 May 2018 | Published: 14 May 2018


Advanced Endpoint Security For Dummies
sponsored by Symantec
EBOOK: Traditional security tools and approaches just aren't enough to protect all of the mobile devices used in your business, and neither can they keep your network itself safe. In the 9 chapters that comprise "Advanced Endpoint Security for Dummies" you'll learn about the new technologies and strategies being developed to fill in this gap.
Posted: 11 May 2018 | Published: 11 May 2018


How to Detect Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.
Posted: 11 May 2018 | Published: 11 May 2018


7 Experts on Moving to a Cloud-Based Endpoint Security Platform
sponsored by Carbon Black
WHITE PAPER: Industry research by IDC shows that 70% of successful breaches enter through an endpoint. In this white paper, 7 security experts discuss their best practices and strategies for moving endpoint protection to the cloud.
Posted: 10 May 2018 | Published: 10 May 2018

Carbon Black

Distributed Deception: A Critical Capability to Protect Infrastructure from Targeted Attacks
sponsored by Illusive Networks
RESOURCE: Discover 5 ways distributed deception can help resist and counter Dragonfly and other APT-style targeted attacks on your infrastructure.
Posted: 09 May 2018 | Published: 22 Mar 2018

Illusive Networks

IoT implementation in mind? Five critical factors you must consider
sponsored by Vitria Technology, Inc.
EGUIDE: Gartner predicts that by 2020 there will be over 20 billion connected things. Keeping pace with the IoT is critical in order for organizations to remain competitive in today's changing IT landscape. Download this e-guide for five factors to consider for a successful IoT implementation.
Posted: 09 May 2018 | Published: 08 May 2018

Vitria Technology, Inc.

2018 Beyond the Phish Report
sponsored by Wombat Security Technologies
ANALYST REPORT: In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.
Posted: 09 May 2018 | Published: 09 May 2018

Wombat Security Technologies

Moving Endpoint Security to the Predictive Cloud
sponsored by Carbon Black
WHITE PAPER: Find out how security professionals are being stretched to their breaking point, and why organizations need to shift their endpoint security away from outdated technology to cloud solutions.
Posted: 09 May 2018 | Published: 09 May 2018

Carbon Black

5 Reasons to Migrate to a Modern Endpoint Protection Platform
sponsored by McAfee, Inc.
RESOURCE: Multiple endpoint security agents, point product deployments, and numerous management consoles can be an unsustainable approach to endpoint security. Explore 5 reasons you should consider moving to a modern endpoint protection platform that integrates multiple defenses into a single framework.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

McAfee, Inc.

CISOs Map Out Their 2018 Cybersecurity Plans
sponsored by
EZINE: As attack vectors increase and cyberattacks become more sophisticated, how are CISOs preparing? Find out inside this issue of Information Security magazine, where security professionals detail the process of developing effective one-year cybersecurity plans.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Your Path to Unified Workspace Management
sponsored by Tech Data - Vmware
WHITE PAPER: Managing a variety of endpoints across different platforms and devices can be challenging, but unified workspace management can help ease these challenges. Download this resource to learn how a unified workspace platform can help your team manage any app on any device, simply and securely.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - Vmware

Evolving Security To Accommodate The Modern Worker
sponsored by DELL & INTEL
RESEARCH CONTENT: In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to address issues ranging from service provisioning, device procurement, and security oversight. Take a look at this Forrester report to uncover a Dell security solution that to evolve security to accommodate the modern worker.
Posted: 20 Apr 2018 | Published: 20 Apr 2018


End User Analytics
sponsored by Lakeside Software
WHITE PAPER: Download this white paper to discover a workspace analytics platform that helps EUC professionals meet the demands of today's workplace and end-users by using a lightweight agent that analyzes performance and usage data from the endpoint, and provides IT teams end-user-level visibility into any environment.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Lakeside Software

Security's Password Crisis
sponsored by Centrify Corporation
WHITE PAPER: Are you neglecting secure access to apps and endpoints? This ebook offers an approach to lower your risk of getting breached by increasing your IAM maturity through adopting a Zero Trust approach with the right IDaaS strategy.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

MalwareBytes Endpoint Protection: Advanced Threat Prevention
sponsored by Tech Data - MalwareBytes
RESOURCE: Effective prevention requires a layered approach capable of addressing not only today's threats, but preventing tomorrow's as well. Access this resource to learn about MalwareBytes Endpoint Protection, a security tool that uses a layered approach with multiple detection techniques.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

Tech Data - MalwareBytes

Multi-Vector Protection: Defense-in-Depth With Layered Techniques for Corporate Endpoints
sponsored by Tech Data - MalwareBytes
RESOURCE: Corporate endpoints are under constant attack. According to the Verizon 2017 DBIR 51% of corporate breaches included malware. Access this resource to find out why securing your organization's endpoints requires multi-layered protection techniques.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Tech Data - MalwareBytes

Enterprise Endpoint Protection Buyer's Guide
sponsored by Tech Data - MalwareBytes
WHITE PAPER: Cybercriminals have moved to a multi-vector attack approach, making it difficult to defend against attacks on the endpoint system. This guide offers core requirements to help navigate enterprise endpoint protection vendor analysis as well as a handy questionnaire to help with the process.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Tech Data - MalwareBytes
1 - 25 of 780 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement