Searching all of TechTarget| 5,802 results for "endpoints"


By Brien Posey ,Kristen Lee ,Reda Chouffani Manage Sep 19, 2016

To defend endpoint security in healthcare, technology teams with training

At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and ... Continue Reading


Get Started Jul 08, 2016

Tackle endpoint defense issues to obtain the best endpoint security

The best endpoint security requires more than virus scanning. This guide shows why antivirus is the least of your worries when it comes to endpoint protection. Continue Reading


By Ed Tittel Evaluate Mar 22, 2016

What to look for in endpoint management tools

Many endpoint management tools share common features, but there are more advanced functions IT can employ, too. Continue Reading


Get Started Jun 28, 2016

Find the best endpoint management software for your business

IT admins have more endpoints to manage than ever before, but they also have more choices when it comes to endpoint management tools. Five robust options stand out. Continue Reading


By Eric Beehler ,Ed Tittel ,Kim Lindros Manage Jun 24, 2016

What IT needs to know about unified endpoint management

Although PCs and mobile devices perform many of the same tasks, IT administrators often manage them separately, and they use very different tools and approaches. Traditional PC-only management tools are too rigid ... Continue Reading


By Eric Klein Evaluate Jun 14, 2016

Why IT should invest in unified endpoint management tools

Having more diverse devices in your organization calls for a unified endpoint management approach. Vendors from BlackBerry to Citrix now offer UEM tools. Continue Reading


By Scott Wallask News Feb 29, 2016

Healthcare information security at a crossroads with endpoints

With an ever-increasing array of mobile devices available, healthcare IT pros must ensure healthcare information security at endpoints. Continue Reading


By Brien Posey Manage Apr 25, 2016

Modern endpoint management comes with new rules

Desktop administrators need to know that the rules of endpoint management have changed: It's not all about PCs anymore. Continue Reading


By Adrian Bridgwater News Apr 13, 2016

Distil Networks: when bad bots feed on API endpoints

The firm's Distil API Security service is designed to protect vulnerable Application Programming Interface (API) endpoints from malicious traffic. Continue Reading


By Kathleen Richards News Apr 01, 2016

What endpoint protection software is on your short list?

Roughly half of survey respondents indicated that their organization is shifting away from static scanning as the primary protection for endpoints. Continue Reading