IT Management  >   Systems Operations  >   Security  >  

Endpoint Security

RSS Feed   
ALSO CALLED: End Point Security, End-point Security
DEFINITION: Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which, in this case, is every user device that connects to the corporate network. Endpoints can include PCs, laptops, handhelds, and specialized equipment such as  … 

Endpoint Security definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary
Endpoint Security Reports
51 - 75 of 589 Matches Previous Page  |  Next Page
The Forrester Wave: Security Analytics Platforms, Q4 2020
sponsored by Splunk
ANALYST REPORT: Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.
Posted: 19 Jan 2021 | Published: 01 Dec 2020

Splunk

Fidelis Extended Detection and Response (XDR)
sponsored by Fidelis
VIDEO: Security teams are responsible for more threats than ever before. As a result, security stacks are bloated, and analysts overloaded. What can security teams do to overcome this overload and get back to mounting coordinated responses? Take two minutes to watch this short video and exhibiting Fidelis’ Extended Detection & Response.
Posted: 15 Jan 2021 | Premiered: 15 Jan 2021

Fidelis

Ensure your Workforce's Network is Free from Threat
sponsored by Insight
WEBCAST: Tune into this webinar to hear an industry expert talk about one leading vendor’s virtual desktop platform, including features, implementation, enhanced security and more.
Posted: 07 Jan 2021 | Premiered: Jan 7, 2021

Insight

What Is The Next Step For Next-Gen Antivirus?
sponsored by Palo Alto Networks
WHITE PAPER: Enterprises need new strategies and more intelligent investments to holistically protect their valuable data from adversaries today and in the future. Get the paper today and protect your organization against tomorrow's attacks.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Palo Alto Networks

What's New - BlackBerry Cyber Suite
sponsored by BlackBerry
DATA SHEET: Today’s organizations are moving closer and closer to a zero-trust model, but with the power of AI, security operations centers can find even more context behind potential threats and incidents. BlackBerry’s Cyber Suite uses both, giving businesses a full spectrum of coverage, managed from a single console. Access this data sheet to learn more.
Posted: 30 Dec 2020 | Published: 30 Dec 2020

BlackBerry

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

Security: Creating Trust in a Zero Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

8 Top Cybersecurity Challenges
sponsored by IronNet
EBOOK: Working with leading companies across various sectors, IronNet has identified the shared security pain points of organizations. By studying this e-book, you can learn 8 of the top cybersecurity challenges faced today, and, you can understand how network detection and response (NDR) can help to mitigate some of these challenges.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

IronNet

Securing the enterprise with 360° visibility: Don’t leave a gap in defenses
sponsored by OpenText
WHITE PAPER: Organizations fight cyberthreats every day, and with more at stake than ever before, including customer data, intellectual property and company reputations, one successful attack can mean game over. This white paper demonstrates why organizations need total visibility and how endpoint detection & response (EDR) can help them achieve it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

OpenText

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 23 Nov 2020 | Published: 24 Nov 2020

ComputerWeekly.com

Market Guide for Managed Detection and Response Services
sponsored by Expel
WHITE PAPER: According to Gartner, “By 2025, 50% of organizations will be using MDR services for threat monitoring, detection and response functions that offer threat containment capabilities. Ensure the MDR provider is experienced and that their technology stack fits well with your existing security controls and IT environment, from on-premises to cloud.”
Posted: 13 Nov 2020 | Published: 26 Aug 2020

Expel

Attacking and Defending a Distributed Workforce
sponsored by ServiceNow
WHITE PAPER: The shift to a distributed, remote workforce has exposed businesses to new attack vectors, including confidentiality threats, remote business process threats and availability threats, all of which alter company risk profiles. What does this mean for network professionals and risk management? Read this white paper to get the answer.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Ces For Enabling And Securing Remote Work
sponsored by CyberArk Software, Inc
EBOOK: In order to achieve flexibility, remote workers are using unmanaged personal devices to conduct work. However, with this increased flexibility comes new securitychallenges that require modern solutions. This eBook highlight these challenges and offers 7 best practices for enabling and securing remote work – read on to get started.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: How will the lessons learned over the past year shape your endpoint and remote worker security goals for 2021? Let us know in this short survey and receive FREE access to our e-guide, The Ultimate Guide to Securing Today's Remote Workforce.
Posted: 28 Oct 2020 | Published: 01 Mar 2021

TechTarget

The Ultimate Guide to Securing Today's Remote Workforce
sponsored by TechTarget
RESOURCE: How will the lessons learned over the past year shape your endpoint and remote worker security goals for 2021? Let us know in this short survey and receive FREE access to our e-guide, The Ultimate Guide to Securing Today's Remote Workforce.
Posted: 28 Oct 2020 | Published: 01 Mar 2021

TechTarget

Build a Solutions-Driven Culture with a Modern Identity
sponsored by Hitachi ID
DATA SHEET: Educational institutions must always invest where they’ll see the biggest impact. Digital identity, connecting students and staff to information that builds knowledge, is an opportunity for pivotal efficiency gains – but the hardest part of identity is management. View this data sheet to learn strategies for campus-wide identity management.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Accelerate Threat Resolution With DNS
sponsored by Infoblox
ANALYST REPORT: Security and risk (S&R) professionals rely on DNS for 3 priorities: early detection and blocking of threats, investigation and response to threats and quick identification of compromised devices. How can organizations get a holistic view of the importance of DNS to security? Browse this Forrester report to learn why DNS is crucial in DLP.
Posted: 19 Oct 2020 | Published: 31 Jul 2020

Infoblox

Market Guide for Zero Trust Network Access
sponsored by Palo Alto Networks
RESOURCE: ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Piloting ZTNA projects as a part of a SASE strategy or to expand remote access may be a wise move. Read the full Gartner article to learn the specifics of their findings.
Posted: 15 Oct 2020 | Published: 08 Jun 2020

Palo Alto Networks

Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK: Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

How to Enhance Cybersecurity as Your Office Reopens
sponsored by Keeper Security Inc
RESOURCE: No matter when the world will be ready to return the office, it’s never a bad idea to evaluate (or reevaluate) cybersecurity in your organization. Everything from device management to training to policies should be carefully scrutinized. Need help getting started? Check out this infographic for 5 ways to enhance cybersecurity.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Keeper Security Inc

The New Reality
sponsored by BlackBerry
WHITE PAPER: Although issues related to protecting and managing endpoints existed long before COVID-19, the recent pandemic put a spotlight on these issues. In order to address these challenges, organizations are opting for unified endpoint security solutions – read on for an in-depth look at what that entails and why it’s gaining popularity.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Know Your Security Model: Traditional vs. Contextual Protection
sponsored by Panda Security
WHITE PAPER: This e-book will cut through the fog that surrounds the term "next-gen endpoint security," exploring the differences between traditional and next-generation cybersecurity protection models, and how Panda's unique protection model employs the best of both to be an industry leading solution.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Panda Security

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation
51 - 75 of 589 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences