IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 582 Matches Previous Page  |  Next Page
The Spectrum of Mobile Risk: The Full Range of Risks to Enterprise Data
sponsored by Lookout Inc.
WHITE PAPER: Risk management tactics needs to evolve to address mobile devices and the risks that threaten them. To encourage this evolution, Lookout developed the Mobile Risk Matrix to help organizations better understand the various mobile device risk and how to address them. Read on to unlock the Matrix.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Lookout Inc.

Alero Intro Video
sponsored by CyberArk Software, Inc
VIDEO: Today’s organizations rely heavily on third-party vendors to conduct business – but with the rise in security threats, how can organizations ensure security for third parties accessing their network? This brief video provides an overview of CyberArk Alero, a secure remote access service. Watch the video to learn more about Alero.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

CyberArk Software, Inc

Apria Healthcare Delivers Secure Health Solutions with Absolute
sponsored by Absolute Software Corporation
CASE STUDY: Apria Healthcare, an at-home clinical services provider, needed to keep their employee’s laptops and other mobile devices secure, especially since their employees are dispersed throughout the United States. Learn how Absolute was able to support Apria with their security needs and keep them in compliance with HIPAA and other healthcare regulations.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Absolute Software Corporation

Secure BYOD for Office 365 Users with Lookout
sponsored by Lookout Inc.
WHITE PAPER: At the intersection of personal and business use, companies need mobile security strategies that support productivity, safeguard corporate data, and address employee resistance to corporate oversight of personal devices. Tap into this white paper to learn how you can provide security to your BYOD users without managing their devices.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Lookout Inc.

Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout Inc.
WHITE PAPER: Mobile devices have opened a profitable new window of opportunity for cybercriminals executing phishing attacks. Luckily, this white paper dives into the myths and facts about mobile phishing, so you can learn how to be equipped for these threats. Read on to get started.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Lookout Inc.

Baltimore City Public School System Delivers Secure Technology to the Classroom
sponsored by Absolute Software Corporation
CASE STUDY: The IT team of the Baltimore City Public School System was faced with the difficult task of ensuring that all school devices – and the sensitive data that they contained –were secured and accounted for. Learn how Absolute helped the school system reduce the risks and costs associated with laptop theft, ensure data protection on devices, and more.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Absolute Software Corporation

Absolute Maximizes Klein Independent School District One-to-One Program
sponsored by Absolute Software Corporation
CASE STUDY: Learn how Absolute allowed the Klein Independent School District (ISD), of Texas to deploy a successful one-to-one computing program with student device security and privacy.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Absolute Software Corporation

Allina Health Ensures HIPAA Compliance
sponsored by Absolute Software Corporation
CASE STUDY: Major healthcare provider, Allina Health, employs a large, highly mobile team who use devices that are often off the corporate network. Therefore, having visibility and control of their entire device fleet at all times is a necessity. With Absolute, Allina Health has been able to do so. Read on to learn how.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Absolute Software Corporation

Absolute Enables Personalized Learning Program at Loudoun County Public Schools
sponsored by Absolute Software Corporation
CASE STUDY: Loudoun County Public Schools wanted to replace their desktops with tens of thousands of laptops. But they needed a solution that would help them prevent device theft and secure sensitive data. Learn how the implementation of Absolute gave the school district a peace of mind of endpoint security, device theft recovery, and data privacy.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Absolute Software Corporation

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

Greenville Health System
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Greenville Health, a not-for-profit healthcare network, partnered with Absolute to gain continuous visibility of their remote devices and data in order to strengthen their security posture while ensuring HIPAA compliance.
Posted: 24 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Wichita State University
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Wichita State University’s (WSU) IT team partnered with Absolute to establish endpoint visibility and control protocols in order to protect their students and faculty while meeting compliance requirements.
Posted: 24 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

The Essential Guide to Secure Web Gateways
sponsored by AT&T Cybersecurity
RESOURCE: Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020

AT&T Cybersecurity

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

Absolute Software Corporation

Creative Lodging Solutions
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.
Posted: 20 Feb 2020 | Published: 15 May 2019

Absolute Software Corporation

CrowdStrike Falcon: Analyst Report on Business Benefits and Cost Savings
sponsored by CrowdStrike
ANALYST REPORT: Download this Forrester TEI report to see the total economic impact that investing in CrowdStrike Falcon could have on your organization versus building your own endpoint security solution.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

CrowdStrike

Data Security for the Way People Work
sponsored by Dell and Intel
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Dell and Intel

Asplundh Tree Expert
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Asplundh, a vegetation management organization, partnered with Absolute to establish inventory management and secure the devices of their increasingly distributed workforce.
Posted: 19 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Euromonitor
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.
Posted: 18 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Privileged Access Credential Management for Loosely Connected Devices
sponsored by Cyber-Ark Software
DATA SHEET: The rise of privileged access and mobile endpoints has enabled organizations to improve their business operations. However, these accounts are vulnerable to attacks, requiring deliberate security planning. Download this data sheet to take a closer look at the features and benefits of the CyberArk Privileged Access Security Solution.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Cyber-Ark Software

KCOM
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.
Posted: 17 Feb 2020 | Published: 13 May 2019

Absolute Software Corporation

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs
1 - 25 of 582 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info