IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
26 - 50 of 746 Matches Previous Page  |  Next Page
The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT: According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Absolute

Ransomware Defense for Dummies
sponsored by Cisco Umbrella
EBOOK: Based on statistics from Cisco's Talos threat intelligence group, on average, 2.9% of compromised victims in a ransomware attack will pay the ransom. Inside this for Dummies e-book, learn everything you need to know about ransomware attacks as well as best practices to reduce ransomware risks.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Cisco Umbrella

4 Easy Ways Central Logging Improves Security Posture
sponsored by Splunk
WHITE PAPER: Reliable central logging or log management is the first critical step toward gaining visibility across a multi-layered security environment. This resource reveals how to gain immediate visibility into critical security incidents with 4 basic sources that security teams can leverage along with central logging.
Posted: 26 Jan 2018 | Published: 26 Jan 2018

Splunk

The New World of Endpoint Security: Traditional Signature-Based Malware and Virus Protection Can't Keep Up
sponsored by Carousel Industries
WHITE PAPER: As cyberattacks develop in complexity, traditional anti-virus and malware protection is no longer the most effective security approach. Explore this white paper to gain insight into an advanced endpoint security strategy and how machine learning can enhance malware protection.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Carousel Industries

Detect Unknown Threats, Reduce Dwell Time, And Accelerate Response
sponsored by Dell and Intel
DATA SHEET: Click inside to learn about an endpoint detection and response tool that can help you detect complex attacks. This system offers continual monitoring and analysis of user behavior in your endpoints, and more.
Posted: 25 Jan 2018 | Published: 30 Nov 2017

Dell and Intel

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

BitSight

Defense-in-depth security now key to keeping IT safe
sponsored by SearchSecurity.com
EBOOK: Defense-in-depth security offers one of the most effective approaches to renovating IT security and replacing the outmoded idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

Assigning Risk Levels & Choosing Authentication Policies
sponsored by Identity Automation
EBOOK: Different types of employees carry different levels of risk. But how do you know the appropriate level of risk for any given employee? This resource reveals tactics for assigning appropriate risk levels and choosing authentication policies to ensure successful security within your enterprise.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

Security within the Financial Services Industry
sponsored by enSilo
RESOURCE: There has been an increase in "file-less malware" as it goes undetected in most organizations. Attackers' motivation is driven by financial gain, so targeting the banking industry with attacks is common. Take a look at this resource to uncover how to improve security within the financial industry to protect against dangerous malware variants.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Market Guide for Endpoint Detection and Response Solutions
sponsored by enSilo
RESOURCE: The endpoint detection and response (EDR) market is rapidly growing as security and risk management leaders seek adaptive security architecture. Take a look at this Gartner Market Guide to uncover various endpoint detection and response strategies.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


4 Reasons Why IAM Should Be the Core of Your Security Program
sponsored by Identity Automation
EBOOK: As businesses embrace BYOD policies and more employees work remotely, companies need to change the way they view the threat landscape. Explore this e-book to uncover how to increase security in a perimeter-less global business environment by advancing IAM.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Identity Automation

The 2017 Trusted Access Report
sponsored by Duo Security
WHITE PAPER: The enterprise perimeter has been redefined by new networking models and with new technology, comes new security risks. Take a look at this 29-page report to learn about the evolution of enterprise security and overall device security health.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Duo Security

The Trouble with Phishing
sponsored by Duo Security
WHITE PAPER: Phishing is one of the most common threats hitting organizations and it is only getting worse. This guide offers insight into the problems around phishing, how it happens, and what your organization can do to defend against the damaging attacks.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Duo Security

Automated Endpoint Security Realized
sponsored by enSilo
RESOURCE: Modern malware is evolving at a rapid rate and most traditional security defenses are failing to detect it in an efficient timeframe. Take a look at this resource to uncover how to leverage endpoint security to protect against damaging malware attacks targeting your enterprise.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Broadcast Media Case Study
sponsored by enSilo
CASE STUDY: Explore this case study to gain insight into how companies within the broadcast media industry overcame the challenge of phishing campaigns targeting their enterprises.
Posted: 16 Jan 2018 | Published: 16 Jan 2018


Aziz Bank of Afghanistan Reduces the Risk of Cyber Threats Using Seqrite Endpoint Security
sponsored by Seqrite
CASE STUDY: Many customers rely on the Azizi Bank's online portal for service requests, but low internet bandwidth was affecting the bank's operation and business behavior. Inside this case study, learn how this bank achieved security through endpoint and firewall protection to monitor and control web traffic.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Seqrite

PCI DSS Endpoint Security
sponsored by enSilo
WHITE PAPER: Take a look at this white paper to learn more about the PCI DSS compliance regulation and how to secure your endpoints to comply with the policy.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Endpoint Security and HIPAA Compliance
sponsored by enSilo
WHITE PAPER: A common requirement in virtually all regulatory compliance objectives and defense in depth strategies is to provide endpoint protection against malware and zero-day threats. Read this white paper to uncover a strategic approach to endpoint security while maintaining HIPAA compliance.
Posted: 15 Jan 2018 | Published: 15 Jan 2018


Case Study: How to Secure Endpoints even at Low Internet Bandwidth
sponsored by Seqrite
CASE STUDY: With the evolving complexities and volume of threats, Posco wanted a one-stop security tool that could help secure their network even at low Internet bandwidth. Learn about why Posco choose an endpoint security tool to overcome this challenge.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Seqrite

Employing Machine Learning in a Security Environment
sponsored by LogRhythm, Inc.
WHITE PAPER: As security vendors look for ways to improve their security posture and fight against advancing cyberattacks, there has been a great deal of interest in machine learning and AI. This white paper offers insight into applying machine learning and AI to your current security environment to improve your ability to swiftly detect and respond to threats.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

How Do You Know If Your Last Security Incident Is Fully Addressed?
sponsored by Tanium
RESOURCE: According to the Ponemon Institute's Cost of a Data Breach Study, it takes organizations an average of 191 days to detect a breach. Once you have dealt with a breach, how do you know it is fully addressed? This infographic reveals staggering statistics regarding cyberattacks, breach detection, and remediation.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Tanium

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic
26 - 50 of 746 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement