Endpoint policy management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoint devices can include PCs, laptops, smartphones and tablets.
Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities.
Commercial endpoint security management systems come with a variety of functions and features including automated patch management and reporting.
Founded: 1993, Tel Aviv, Tel Aviv District, Israel
Key Principals: Network Security products
Founded: 1987, Santa Clara, CA, USA
Key Principals: Security software products
Founded: 1911, Armonk, New York, USA
Key Principals: Computer Hardwares, Softwares, Services, Consulting
Founded: 1996, Mountain View, California,
Key Principals: Backup and Security products and softwares
Founded: 1997, Moscow, Russia
Key Principals: Computer software, Security software
Let us know what you are looking for and we'll list out multiple vendors matching your requirements. You can also call us on 08151801000.
Register now to explore technologies, connect with best vendors and manage your IT procurements online.
We are happy to see you return! Please login to continue