Essential Guide

Mobile endpoint security: What enterprise infosec pros must know now

A comprehensive collection of articles, videos and more, hand-picked by our editors

endpoint security management

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets

Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities.

Commercial endpoint security management systems come with a variety of functions and features including automated patch management and reporting.

This was first published in January 2012

Continue Reading About endpoint security management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Mobile endpoint security: What enterprise infosec pros must know now

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchEnterpriseDesktop

SearchVirtualDesktop

SearchVMware

SearchCIO

SearchSecurity

Close