Endpoint Policy Management

Endpoint policy management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets.

Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities.

Commercial endpoint security management systems come with a variety of functions and features including automated patch management and reporting.



List of Vendors for Endpoint Policy Management


CheckPoint

Founded: 1993, Tel Aviv, Tel Aviv District, Israel

Website: www.checkpoint.com

Key Principals: Network Security products

Click here to view products, solutions & other details of CheckPoint

Mcafee

Founded: 1987, Santa Clara, CA, USA

Website: www.mcafee.com

Key Principals: Security software products

Click here to view products, solutions & other details of Mcafee

IBM

Founded: 1911, Armonk, New York, USA

Website: www.ibm.com

Key Principals: Computer Hardwares, Softwares, Services, Consulting

Click here to view products, solutions & other details of IBM

Symantec

Founded: 1996, Mountain View, California,

Website: www.symantec.com

Key Principals: Backup and Security products and softwares

Click here to view products, solutions & other details of Symantec

Kaspersky

Founded: 1997, Moscow, Russia

Website: www.Kaspersky.com

Key Principals: Computer software, Security software

Click here to view products, solutions & other details of Kaspersky

© 2013 ITATONE POINT CONSULTING LLP. All rights reserved.