IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
1 - 25 of 572 Matches Previous Page  |  Next Page
G2 2021 Fall Report ENDPOINT MANAGEMENT SOFTWARE
sponsored by Absolute Software Corporation
RESEARCH CONTENT: Endpoint management software products help users keep track of devices in a system and ensure their software is secure and up to date. Download this exclusive grid report from G2, the world’s leading business software review platform, to unlock insights into endpoint management best practices, necessary capabilities, and more.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Absolute Software Corporation

The Reality of IAM and Blockchain
sponsored by TechTarget
RESOURCE: You've been chosen to participate in our Identity and Access Management Research Program! By participating in the questionnaire and sharing your valuable cybersecurity insights, you'll gain FREE access to our whole IAM library. We regularly add content, so you'll always be up-to-date on the latest trends, insights, technologies & data.
Posted: 03 Oct 2021 | Published: 03 Oct 2021

TechTarget

Guide to Enabling a Work from Anywhere Organization
sponsored by Zscaler
EGUIDE: The Zscaler Zero Trust Exchange provides secure, seamless access to the internet and cloud apps or private apps in the data center or public and private clouds. Explore this guide to learn more about Zscaler’s offering.
Posted: 23 Sep 2021 | Published: 23 Sep 2021

Zscaler

Magic Quadrant For Unified Endpoint Management
sponsored by VMware
WHITE PAPER: Access this Gartner Magic Quadrant for Unified Endpoint Management to evaluate 8 vendors with solutions in the space to see which option can deliver transformational technologies and approaches for your future needs.
Posted: 13 Aug 2021 | Published: 05 Jan 2021

VMware

How EDR Offers Threat Detection, Insights, and Remediation
sponsored by Malwarebytes
WHITE PAPER: Establishing an effective endpoint detection and response (EDR) platform can be an organization’s best defense against rampant malware and ransomware attacks. Read this white paper to learn more about EDR, including how it compares to traditional endpoints security and how it stands up to ransomware.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

Malwarebytes

Watchguard Advanced Endpoint Security Unlock Your Managed Security Services Growth
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Small and medium businesses are at a high risk in today’s world of automated, intelligent hacking. And with remote work being more popular than ever, endpoint security is crucial. Read on to learn how the WatchGuard Endpoint Security portfolio helps MSPs predict, prevent, and respond to security threats of any kind.
Posted: 16 Jul 2021 | Published: 16 Jul 2021

WatchGuard Technologies, Inc.

The Intelligent Edge: A Faster, More Efficient Way to Manage Your IT Risk
sponsored by Tanium
WHITE PAPER: Endpoints connect your organization’s two most important assets: people and data. Tanium’s “Intelligent Edge” is a process designed to manage your endpoint devices and maximize your IT resources. This guide will help you gain the speed, visibility and insights to survive and thrive in this new era of remote work and pervasive cybercrime.
Posted: 02 Jul 2021 | Published: 02 Jul 2021

Tanium

Malwarebytes Integration with Datto RMM
sponsored by Malwarebytes
DATA SHEET: For MSPs, when there’s a business opportunity to offer effective endpoint protection to new customers, timely development is key. Malwarebytes and Datto have joined forces to create an integrated solution to deliver just that. Access this data sheet for an overview of the joint solution including its key capabilities and use cases.
Posted: 25 Jun 2021 | Published: 25 Jun 2021

Malwarebytes

HOW UES PROTECTS SHIFTING WORK ENVIRONMENTS.
sponsored by BlackBerry
RESEARCH CONTENT: New security challenges stemming from the 2020 pandemic have heightened requirements for a unified endpoint security (UES) solution at many organizations. Read this report to unlock exclusive research into the endpoint security landscape, the impact of remote work, use cases for UES, and more.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

BlackBerry

The Total Economic Impact™Of Deep Instinct
sponsored by Deep Instinct
ANALYST BRIEF: This Forrester Total Economic Impact report provides an exclusive insider look at the features, tangible benefits and 3-year financial impact of Deep Instinct – gathered through 4 customer interviews and data aggregation. Read on to access the full report.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

Deep Instinct

AppGuard Defeats Polymorphic Malware Attack, Prevents Spread to other Systems Protects Against Future Zero- Day Attacks
sponsored by AppGuard
WHITE PAPER: In 2019, the Mahnomen County Sheriff’s Office was hit by a malware attack. It moved quickly, immobilizing activities and rapidly jumping from computer to computer. Take a quick survey to access more about the Mahnomen County Sheriff’s Office attack and cybersecurity solutions that defends against new, emerging, and unique attacks.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Prevent Zero- Day Attacks with The Right Defense
sponsored by AppGuard
QSO INCENTIVE: Complete a brief survey to access this white paper outlining the zero-day attack threat and why traditional endpoint protection tools are ineffective at protecting against them. Find out how the Microsoft Exchange Server attack unfolded and the steps you can take to prevent becoming a victim to zero-day attacks.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Endpoint Protection for Small to Medium Business
sponsored by AppGuard
WHITE PAPER: Just because you’re a smaller sized company, doesn’t mean you’re safe. According to Ponemon Institute, 63% of SMBs experienced a data breach in 2019. Luckily, this excerpt will explain how you can gain the endpoint protection you need to disrupt malware before it causes harm.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Endpoint Protection for Small to Medium Business
sponsored by AppGuard
WHITE PAPER: Just because you’re a smaller sized company, doesn’t mean you’re safe. According to Ponemon Institute, 63% of SMBs experienced a data breach in 2019. Luckily, this excerpt will explain how you can gain the endpoint protection you need to disrupt malware before it causes harm.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

AppGuard

Cisco Umbrella Video
sponsored by Cisco Umbrella
WEBCAST: Find out how you can strengthen your security posture and protect your users and devices, everywhere they access the internet.
Posted: 21 May 2021 | Premiered: May 21, 2021

Cisco Umbrella

Ten Signs It’s Time to Review Your Endpoint Protection Guide
sponsored by BlackBerry
RESOURCE: The ongoing trend of successful cyberattacks continues to illustrate that current cybersecurity practices and solutions may not be able to keep pace with sophisticated and evolving modern threats. Download this guide to learn the 10 signs that indicate it's time to review and reevaluate your endpoint protection.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

BlackBerry

Replacing Legacy AV
sponsored by BlackBerry
DATA SHEET: Sophisticated new threats are outpacing organizations relying on a legacy antivirus solution. As these threats evolve, enterprises need security that can keep up. BlackBerry Cyber Suite is an AI-based platform that can help increase defenses dramatically. Learn more in this solution brief.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

BlackBerry

eSentire MDR with Microsoft Defender for Endpoint
sponsored by eSentire
DATA SHEET: With today’s cybersecurity threats having become so pervasive, and with security talent in short supply, organizations are turning to managed threat detection that scans over multiple tiers without increasing complexity. Examine this data sheet to explore eSentire Managed Detection and Response (MDR) with Microsoft Defender for Endpoint.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

eSentire

IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment
sponsored by BlackBerry
ANALYST REPORT: In the IDC MarketScape: Worldwide Unified Endpoint Management Software 2021 Vendor Assessment, BlackBerry was positioned as a leader of UEM software technology. Read this report to learn more about why BlackBerry was named a Leader.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

BlackBerry

VIB Endpoint Security Effectiveness Survey
sponsored by Illumio
WHITE PAPER: This report summarizes the results of over 450 IT and Security professionals conducted by Virtual Intelligence Bureau (ViB) to understand how organizations protect their endpoints against ransomware and malware. Download the report for insights into respondents current endpoint security efforts and the critical gap that needs to be addressed.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

Illumio

The Rise of Credential Stuffing Attacks
sponsored by TechTarget
RESOURCE: According to Verizon's 2021 DBIR, today's cybercriminals want credentials. In fact, compromised credentials are cited as the top cause across most data breaches. Access our expert e-guide, The Rise of Credential Stuffing Attacks, to unlock exclusive insight on cybercriminal behavior and best practices for keeping your employee accounts safe.
Posted: 02 Apr 2021 | Published: 03 Oct 2021

TechTarget

Visibility Gap Study
sponsored by Tanium
WHITE PAPER: Download this whitepaper to learn more about the five key challenges for IT in 2020 that this survey uncovered.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

Tanium

Challenge the Rules of Security: Transform the Threat Surface to Proactive Control
sponsored by Google Chrome OS
VIDEO: Watch now to learn how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
Posted: 24 Mar 2021 | Premiered: 12 Mar 2021

Google Chrome OS

Strained Relationships Between Security And It Ops Teams Leave Businesses At Risk
sponsored by Tanium
ANALYST REPORT: Tanium commissioned Forrester Consulting to survey more than 400 IT leaders at large enterprises to uncover the challenges and consequences they face when managing and securing their endpoints. Download the study to uncover the results.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Tanium

Quocirca: Selecting a cloud printing platform
sponsored by ComputerWeekly.com
RESOURCE: As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.
Posted: 12 Jul 2021 | Published: 12 Jul 2021

ComputerWeekly.com
1 - 25 of 572 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences