About UsBlog

Endpoint security

Endpoint security

In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.

Usually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices).  The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).

Endpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.

The most popular products in category Endpoint security All category products

McAfee Endpoint Security
11
10
VMware Carbon Black Cloud Endpoint Standard
0
0
Symantec Endpoint Protection
15
10
Dr.Web Desktop Security Suite
3
1
Dr.Web Enterprise Security Suite
6
5
McAfee Complete Endpoint Threat Protection
20
14
McAfee Complete EndPoint Protection - Business (CEB)
16
6
McAfee Endpoint Protection — Advanced Suite
12
10
Ericom Shield Remote Browser Isolation (RBI)
0
0
ESET Secure Enterprise
20
19
ESET Endpoint Protection advanced
3
7
ivanti ENDPOINT SECURITY
13
12

Compare of products in the category Endpoint security

Please turn the screen for optimal content display

Compare: Endpoint Security

Characteristics

Anti-malware

File Reputation Scanning

URL filtering

HIPS

Firewall

Sandbox

User behavior Analytics

Application Control

Device & Port Control

Application Vulnerability Managment

Data Loss Prevention

Device Configuration Management

Disk Encryption

File Encryption

Windows support

Linux support

MS Sharepoint support

MS Exchange Support

IBM Lotus Domino support

Unix Support

Mac OS X Support

Android Support

iOS Support

Windows Mobile Support

Vmware support

Huper-V Support

Citrix Support

Windows Server Support

Patch Management

Threat Intelligence Feeds

SIEM

Endpoint Management

NAC

YES
YES
N/A
YES
Yes, if there is the McAfee Threat Intelligence Exchange module
N/A
N/A
N/A
USB only
YES
N/A
N/A
N/A
N/A
YES
N/A
N/A
N/A
USB only
YES
N/A
N/A
YES
YES
Yes, if there is VDI-Module
N/A
N/A
N/A
N/A
Yes, if there is McAfee Threat Intelligence Exchange module
N/A
N/A
N/A
N/A
Yes, if there is McAfee Threat Intelligence Exchange module
Found mistake? Write us.

Suppliers Endpoint security

Cisco
AUT...
  • AUT
  • AUS
  • BRA
  • CAN
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • HUN
  • MEX
  • NOR
  • POL
  • SGP
  • UKR
  • USA
ISSP
CAN...
  • CAN
  • GEO
  • KAZ
  • POL
  • UKR
  • USA
Softprom (supplier)
ARM...
  • ARM
  • AUT
  • GEO
  • KAZ
  • MDA
  • UKR
MUK (supplier)
ARM...
  • ARM
  • AZE
  • GEO
  • KGZ
  • KAZ
  • MDA
  • TJK
  • TKM
  • UKR
  • UZB
Cybonet
ARE...
  • ARE
  • ARM
  • AUT
  • DEU
  • GBR
  • GEO
  • KGZ
  • KAZ
  • MDA
  • TJK
  • TKM
  • UKR
  • UZB
Avast
CZE...
  • CZE
  • DEU
  • GBR
  • USA
Bitdefender
ARE...
  • ARE
  • AUS
  • CAN
  • DEU
  • DNK
  • ESP
  • FRA
  • GBR
  • ITA
  • NLD
  • ROU
  • SWE
  • USA
ANYSOFT
UKR...
  • UKR
  • USA
Accelerite
AUS...
  • AUS
  • GBR
  • IND
  • LKA
  • SGP
  • USA
Blancco
ARE...
  • ARE
  • DEU
  • FIN
  • FRA
  • GBR
  • IRL
  • NLD
  • SWE

Vendors Endpoint security

Cisco
AUT...
  • AUT
  • AUS
  • BRA
  • CAN
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • HUN
  • MEX
  • NOR
  • POL
  • SGP
  • UKR
  • USA
Barracuda Networks
AUT...
  • AUT
  • AUS
  • BEL
  • CAN
  • CHE
  • CHN
  • DEU
  • FRA
  • GBR
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • LIE
  • LKA
  • LUX
  • MYS
  • NPL
  • NZL
  • PRT
  • SGP
  • USA
ESET
All countries
Cybonet
ARE...
  • ARE
  • ARM
  • AUT
  • DEU
  • GBR
  • GEO
  • KGZ
  • KAZ
  • MDA
  • TJK
  • TKM
  • UKR
  • UZB
Acronis
AUS...
  • AUS
  • BGR
  • CHE
  • DEU
  • FRA
  • ITA
  • JPN
  • KOR
  • ROU
  • SGP
  • TUR
  • USA
  • SRB
IGEL
All countries
Avast
CZE...
  • CZE
  • DEU
  • GBR
  • USA
Bitdefender
ARE...
  • ARE
  • AUS
  • CAN
  • DEU
  • DNK
  • ESP
  • FRA
  • GBR
  • ITA
  • NLD
  • ROU
  • SWE
  • USA
Accelerite
AUS...
  • AUS
  • GBR
  • IND
  • LKA
  • SGP
  • USA
Armis
ISR...
  • ISR
  • USA
Fenror7
DEU...
  • DEU
  • ISR
  • USA
Blancco
ARE...
  • ARE
  • DEU
  • FIN
  • FRA
  • GBR
  • IRL
  • NLD
  • SWE

F.A.Q. about Endpoint security

What are endpoint devices?

Any device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.

What is endpoint security management?

A set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.

What is endpoint security software?

Programs that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.

What is endpoint detection and response (EDR)?

Endpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.

Materials