IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
101 - 125 of 746 Matches Previous Page  |  Next Page
HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

How to Create an Endpoint Protection Plan
sponsored by TechTarget
RESOURCE: A recent TechTarget survey shows that IT and security pros are concerned about undetected threats, false alerts, and data breaches with their current endpoint protection. Explore endpoint security methods and technology options through our Endpoint Protection Planning Guide to create a protection plan that works for you.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TechTarget

Evolution of the EMM Industry
sponsored by MobileIron
RESOURCE: Download this resource to see how the EMM industry has evolved over the years, how vendors in the space compare, and what makes the top vendor stand out from the competition.
Posted: 28 Jun 2017 | Published: 09 Jun 2017

MobileIron

Win the War Against Ransomware
sponsored by Commvault
EBOOK: If you're ready to protect your data from the increasing risk of ransomware, consider these 6 tips.
Posted: 23 Jun 2017 | Published: 31 Aug 2016

Commvault

Managing IoT Data: What to Consider
sponsored by Bayshore Networks
RESEARCH CONTENT: In this interview with Carrie MacGillivray, the vice president for IDC's IoT and mobility teams, learn about two key issues: How to protect IoT data, and how to transform it into meaningful insights that enhance decision-making.
Posted: 24 May 2017 | Published: 31 Dec 2016

Bayshore Networks

Build Strong Security, Starting From The Device-Level
sponsored by Lenovo
EGUIDE: In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

CISSP Exam Prep and Practice Guide
sponsored by TechTarget
EGUIDE: The CISSP exam is challenging and covers a vast array of complex and in-depth topics; many deem it as a remarkably difficult exam to pass. But don't worry – we are here to help. Our new expert resource,CISSP Prep: 4 Steps to Achieve Your Certification, has everything you need to earn and maintain your CISSP certification.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

TechTarget

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE: Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 27 Jul 2017 | Published: 26 Jul 2017

Sentinel Labs, Inc.

Improving Endpoint Security and Signature-Based Detection
sponsored by Sentinel Labs, Inc.
EGUIDE: Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
Posted: 27 Jul 2017 | Published: 24 Jul 2017

Sentinel Labs, Inc.

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com

Top 5 IoT Deployment Best Practices
sponsored by Hewlett Packard Enterprise
RESOURCE CENTER: Overcome potential barriers to IoT adoption by uncovering 5 best practices for creating successful IoT deployments with end-to-end network security, automatic app performance optimization, smart monitoring of wired and wireless infrastructure, and more.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

Hewlett Packard Enterprise

DaaS Provider Evaluation Checklist
sponsored by Dizzion
WHITE PAPER: With so many options and vendors out there, researching desktop as a service (DaaS) can be a time consuming task. What questions should you ask? What should you be evaluating? Download this checklist to gain a real-world, hands-on tool to use to make the information gathering process easier.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

Dizzion

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Threat Hunting For Dummies
sponsored by Carbon Black
EBOOK: It's time to get proactive with threat hunting. In this Threat Hunting for Dummies e-book learn how to optimize your tools for endpoint visibility and threat intelligence and uncover 10 tips for creating effective threat hunting strategies.
Posted: 09 May 2017 | Published: 08 May 2017

Carbon Black

How to Ensure Mobile Employee Productivity with a Secure EMM Strategy
sponsored by BlackBerry
EGUIDE: Today an EMM strategy is not just about meeting employee demands for anytime, anywhere access to data and applications, it's also about maximizing employee productivity while keeping up with those demands. Discover an EMM suite that enhances mobile worker productivity and ensures mobile security.
Posted: 08 May 2017 | Published: 01 May 2017

BlackBerry

Customer Success Stories: Unified Endpoint Management
sponsored by vmware airwatch
EBOOK: End users expect to be able to work anywhere, at any time, and from any device. They expect a similar experience for accessing work apps and data across all their devices. Download now to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

vmware airwatch

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

How to Tackle Endpoint Defense Issues
sponsored by Carbon Black
EGUIDE: Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.
Posted: 31 Jan 2017 | Published: 27 Jan 2017

Carbon Black

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

5 Tips for Choosing a Next-GenerationEndpoint Security Solution
sponsored by Cisco
WHITE PAPER: Learn 5 tips for choosing an endpoint security solution that will protect against the modern threat landscape and prevent a breach. Learn how to detect, block, and remediate advanced malware across all endpoints.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

Cisco

Why AirWatch EMM is the Future of Mac Management
sponsored by vmware airwatch
WEBCAST: Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Top Benefits of Integrated Endpoint Protection
sponsored by TrendMicro
EGUIDE: When implementing endpoint security, is it better to buy standalone products or an endpoint security suite? Access this e-guide to learn the benefits of integrated endpoint protection software and find out for yourself.
Posted: 11 Nov 2016 | Published: 10 Nov 2016

TrendMicro

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro
101 - 125 of 746 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement