This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
7. - Key terms for the MDM world and beyond: Read more in this section
- application sandboxing
- COPE (corporate-owned, personally-enabled)
- dual persona (mobile device management)
Explore other sections in this guide:
- 1. - Mobile device management strategy and policy
- 2. - MDM tools, training and software
- 3. - Focusing on the endpoints
Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets.
Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities.
Commercial endpoint security management systems come with a variety of functions and features including automated patch management and reporting.