IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 786 Matches Previous Page  |  Next Page
Now Tech: Endpoint Detection And Response
sponsored by Carbon Black
RESEARCH CONTENT: Learn how you can improve your enterprise security with endpoint detection and response vendors in this 2018 Forrester Research Report.
Posted: 12 Jul 2018 | Published: 01 Feb 2018

Carbon Black

The State of Endpoint Security, 2018
sponsored by Carbon Black
WHITE PAPER: Take a look at Forrester Research's report that examines the key takeaways of endpoint security trends of 2018 and the expectations for the future.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Carbon Black

The Forrester Wave™: Endpoint Security Suites, Q2 2018
sponsored by Carbon Black
RESEARCH CONTENT: Learn which endpoint security provider is best for your enterprise in Forrester's evaluation of the 15 leading vendors in their Q2 2018 research report.
Posted: 11 Jul 2018 | Published: 21 Jun 2018

Carbon Black

Think beyond UEM to accelerate your digital transformation journey
sponsored by Citrix
WHITE PAPER: Download this white paper to learn about a workspace management platform that provides a single point of control across every part of your digital workspace – going beyond just endpoints to apps, content, identities, networks and more.
Posted: 06 Jul 2018 | Published: 06 Jul 2018

Citrix

Three signs it's time to move to a digital workspace
sponsored by Citrix
WHITE PAPER: Download this 6 page guide to see how a digital workspace with unified endpoint management can help solve the challenges and improve employee productivity and security.
Posted: 06 Jul 2018 | Published: 06 Jul 2018

Citrix

McAfee Cloud Security for Salesforce
sponsored by McAfee, Inc.
WHITE PAPER: McAfee® Skyhigh Security Cloud for Salesforce helps organizations securely accelerate their business by providing total control over data and user activity in Salesforce. Learn more about 25 key features of the software in this data sheet.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

McAfee, Inc.

Inadequate Penetration Testing Puts Sensitive Data in the Crosshairs
sponsored by InteliSecure
WHITE PAPER: In this white paper, find out why some organizations see penetration testing as a box to check in order to meet compliance requirements and why they must dispel this myth if they want value from the testing.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

InteliSecure

How to drive productivity in today's cloud-first world
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a secure digital workspace can increase visibility and simplify management of all apps, desktops, data and devices while giving employees the unified experiences they need to be productive.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

Citrix

Four Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: What's happening in your security environment? Get the complete picture.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Splunk

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: In this white paper, explore a step-by-step journey on how to detect unknown malware activity and early signs of compromise in a Windows environment and find out how security analysts can gain a significant understanding of detailed activities on endpoint.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Splunk

Secure Digital Workspace - Buyer Check List
sponsored by AdvizeX Technologies
RESOURCE: Use this checklist to help choose the right digital workspace for your organization.
Posted: 27 Jun 2018 | Published: 27 Jun 2018

AdvizeX Technologies

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Bringing Your Own: A White Paper on Devices and Applications for Personal and Professional Use
sponsored by Evernote
WHITE PAPER: Download this white paper to learn how you can balance meeting employee demands for flexible device choice while maintaining security and effectively managing disparate devices through enterprise mobility management.
Posted: 19 Jun 2018 | Published: 31 Dec 2017

Evernote

5 Must-Ask DNS Questions
sponsored by Akamai Technologies
WHITE PAPER: Cybercriminals are evolving. They are capitalizing on the open and unprotected nature of the DNS to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are 5 things to ask yourself as you consider a DNS security solution for your company.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Akamai Technologies

Modernize Your Business Workflow
sponsored by Dell India
RESOURCE: Download this white paper to discover how you can empower users with a refreshed, secure and powerful PC fleet designed with productivity, collaboration, endpoint security, and Windows 10 optimization in mind.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Dell India

Hospital Had Backups, Paid Ransom Anyway
sponsored by Cylance
CASE STUDY: Every enterprise with sensitive data can fall victim to a ransomware attack like SamSam. This case study explores how enterprises with sensitive or important data should make backups and address how they implement their remote desktop protocol (RDP). Read on to understand the value RDP has to offer when used correctly.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

Top 4 Things to Consider when Choosing a Next-gen Endpoint Security Solution
sponsored by Cylance
RESOURCE: If you are making the move to a next-gen endpoint security solution to improve your team's efficiency, meet government mandates or other reasons, this resource highlights 4 characteristics to consider before making a selection.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Cylance

Understand the Cybercrime Underworld. Knowledge Is Power
sponsored by Cylance
VIDEO: Find out more about "the dark web" and the evolution of malware. The simplicity and cheap cost of malware, allows anyone to commit cybercrimes.
Posted: 08 Jun 2018 | Premiered: 28 Mar 2018

Cylance

Safelite Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: Find out how Safelite used artificial intelligence to predict, detect, and prevent malware before it could ever execute.
Posted: 06 Jun 2018 | Published: 31 Dec 2017

Cylance

How a Children's Hospital Found the Medicine for Endpoint Security
sponsored by Cylance
CASE STUDY: This case study explores how Phoenix Children's Hospital and its IT security team prevents malicious activity targeting their 5,000 endpoints before it can endanger sensitive patient and payment information and hospital operations.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

Advanced Endpoint Protection: Cylance Security Value Map
sponsored by Cylance
RESOURCE: In this report, find out how Cylance updated their product software and how the update impacted their security effectiveness score and protected agent value.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

Cylance

SE Labs Predictive Malware Response Test
sponsored by Cylance
ANALYST REPORT: Uncover findings from SE Labs predictive malware response testing, and learn how an AI technology at the heart of an endpoint protection platform can keep your organization safe from zero-day attacks.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Cylance

VolitionRx Takes on Cybersecurity
sponsored by Cylance
CASE STUDY: In this case study, learn how VolitionRx took on cybersecurity to prevent malicious activity targeting endpoints before it could endanger sensitive patient information.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

Cylance

Your Instant Genius Guide to a Secure Digital Workspace
sponsored by AdvizeX Technologies
WHITE PAPER: Download this guide to explore the issues related to the deployment of a secure digital workspace, and uncover some of the proven best practices that can guide a successful unified workspace adoption.
Posted: 01 Jun 2018 | Published: 01 Jun 2018

AdvizeX Technologies
1 - 25 of 786 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement