IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
51 - 75 of 749 Matches Previous Page  |  Next Page
Employing Machine Learning in a Security Environment
sponsored by LogRhythm, Inc.
WHITE PAPER: As security vendors look for ways to improve their security posture and fight against advancing cyberattacks, there has been a great deal of interest in machine learning and AI. This white paper offers insight into applying machine learning and AI to your current security environment to improve your ability to swiftly detect and respond to threats.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

LogRhythm, Inc.

How Do You Know If Your Last Security Incident Is Fully Addressed?
sponsored by Tanium
RESOURCE: According to the Ponemon Institute's Cost of a Data Breach Study, it takes organizations an average of 191 days to detect a breach. Once you have dealt with a breach, how do you know it is fully addressed? This infographic reveals staggering statistics regarding cyberattacks, breach detection, and remediation.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Tanium

The 7 Building Blocks of Better Threat Visibility
sponsored by RSA
WHITE PAPER: According to RSA, the anticipated losses to cybercrime by 2021 are $6 trillion. Explore this e-book to uncover how to advance your threat visibility with 7 building blocks.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

RSA

5 Ways to Boost Your Security Team's Impact
sponsored by RSA
WHITE PAPER: 93% of security operations center (SOC) managers are unable to triage all potential threats. Explore this resource to uncover 5 tools to boost your security team's impact.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

tCell

Protecting Endpoints Everywhere
sponsored by Cisco Umbrella
EBOOK: In this e-book, gain a closer look at how security challenges have evolved and the steps your organization can take to ensure end-to-end security, especially as IoT and mobile device continue to grow.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Cisco Umbrella

How to Embrace a Zero Day Compliance Model for Windows 10 Patch Management
sponsored by VMware
WHITE PAPER: Windows 10 is now a fact of life for most enterprises, offering a wide range of improvements and benefits over legacy Windows systems. But Microsoft has changed the rules of the game when it comes to delivery and management of OS updates. Download the whitepaper to learn more.
Posted: 02 Nov 2017 | Published: 31 Oct 2017

VMware

Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017

Cylance

Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec
WHITE PAPER: This white paper reveals an endpoint security report comparing 5 security products based on 17 benchmark performance metrics to assess product performance.
Posted: 18 Oct 2017 | Published: 10 Feb 2017

Symantec

The 4 Critical Areas You Must Address for Cloud Security
sponsored by Symantec
WHITE PAPER: As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec
WHITE PAPER: Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec

Anti-Virus Comparative
sponsored by Symantec
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Uncover results from the Malware Protection Test and the Exploit Test to compare 7 endpoint security vendors.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec

Endpoint Security - Market Quadrant 2016
sponsored by Symantec
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016

Symantec

Overview of AWS Security - Application Services
sponsored by Amazon Web Services
WHITE PAPER: Amazon Web Services offers a variety of managed services to use with your applications, including services that provide application streaming, queueing, push notification, email delivery, search, and transcoding. Learn more inside.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: APIs provide transparency to the internal structure of applications and provide granular access to an application's backend, making online businesses more vulnerable than ever before to cyberattack threats. This white paper outlines the most common types of cyberattacks and offers strategies for protecting APIs.
Posted: 09 Oct 2017 | Published: 31 Dec 2016

Akamai Technologies

The Next Generation of Cloud App Security
sponsored by Symantec
WHITE PAPER: By 2020, 85% of large enterprises will use a cloud access security broker (CASB) platform for their cloud services which is up from less than 5% today, according to Gartner. This white paper offers benefits of CASB and how to increase efficacy, avoid incidents and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

Turning the Tide Against Ransomware
sponsored by Proofpoint, Inc.
WEBCAST: WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.
Posted: 05 Oct 2017 | Premiered: Oct 5, 2017

Proofpoint, Inc.

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

IT Security: Cost Center or Strategic Investment?
sponsored by Kaspersky Lab
WHITE PAPER: Understanding the math behind the cost of a cyberattack is more crucial now than ever. By reading this white paper, gain a deeper understanding of the cost of IT security incidents and how to move your organization forward in preventing data breaches.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

ROI Analysis: IBM BigFix Patch And BigFix Compliance
sponsored by IBM
WHITE PAPER: This Forrester report examines the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

IBM

Cloud-based Apps: For Better or Worse
sponsored by Verizon
WHITE PAPER: In this white paper, gain a stronger understanding of the questions you should be asking when implementing SaaS, as more business apps move to the cloud.
Posted: 31 Oct 2017 | Published: 28 Feb 2017

Verizon

Explore the latest enterprise mobile security technology
sponsored by SearchMobileComputing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

SearchMobileComputing
51 - 75 of 749 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement