Endpoints are any nodes or devices which connect or access network services including:

Stationary, Workstations, Printers, Mobile, Laptops, Telephones, Smart Phones, Tablet Computers, Portable Digital Assistants or PDAs, USBs, DigitalCameras, RFIDs, Infrared-enabled devices such as printers and smart cards

Securing the data at the “Endpoint” is Endpoint Security

The Benefits of End-point Security

Providing Protection Against

  • Malware – “any software or code developed for the purpose of compromising or harming information assets without the owner ’s informed consent”
  • Hacking – “all attempts to intentionally access or harm information assets without (or in excess of) authorization by thwarting logical security mechanisms”
  • Social – “tactics employing deception, manipulation, intimidation, etc. to exploit the human element, or users, of information assets”
  • Misuse – “using organizational resources or privileges in a manner contrary to that which was intended”
  • Physical – “human-driven threats that employ physical actions and/or require physical proximity”
  • Error – “anything done (or left undone) incorrectly or inadvertently”
  • Environmental – “natural hazards (floods, earthquakes..)and infrastructure related (power failures, pipe leaks..)

Enterprise Security for Endpoints

Provides flexible, strong protection for file servers, desktops, laptops, and mobile devices with innovative technology that frees endpoint resource.

Enterprise Security Suite

Delivers centrally managed security with adaptive protection and faster performance—protecting from gateway to endpoint so you can confidently drive your business forward.

Enterprise Security for Endpoints and Mail Servers

Offers multi-threat protection for mail and file servers, desktops, laptops, and mobile devices.

Endpoint Encryption

Fully encrypts your data at rest on desktops, laptops, files, folders and removable media such as CDs, DVDs, and USB drives. Endpoint encryption protects your data if your device is lost or stolen, and prevents unauthorized access and data breach.

Endpoint Security Solutions

TrendMicro Officescan
Kaspersky Endpoint Protection
Palo Alto Traps
Symantec Endpoint Protection
McAfee Endpoint Protection
Sophos Endpoint Protection
Carbon Black

Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilization.







More Information: https://www.trendmicro.com/en_us/business/products/user-protection/sps/endpoint.html



Kaspersky Endpoint Security 8 for Windows replaces both Kaspersky Anti-Virus 6.0 for Windows Workstations and Kaspersky Ant-Virus 6.0 for Windows Servers. One installation package will work on both hardware devices.

More Information: https://www.kaspersky.com/


Traps™ advanced endpoint protection stops threats on the endpoint and coordinates enforcement with cloud and network security to prevent successful cyberattacks.

Product Description

Unique in the breadth and depth of its endpoint protections, Traps:

  • Stops malware, exploits and ransomware before they can compromise endpoints.
  • Provides protection while endpoints are online and offline, on network and off.
  • Coordinates enforcement with network and cloud security to prevent successful attacks.
  • Detects threats and automates containment to minimize impact.
  • Includes WildFire® cloud-based threat analysis service with your Traps subscription.
  • Integrates with the Palo Alto Networks® Security Operating Platform.





More information: https://www.paloaltonetworks.com/products/secure-the-endpoint/traps

Endpoint Protection has unrivaled Security, Blazing Performance and
support for Virtual Environments. By layering technologies like Insight and SONAR, antivirus scans are reduced and maximum performance is achieved while stopping cybercriminals and even zero-day threats in their tracks.






More Information: https://www.symantec.com/products/endpoint-protection

McAfee Endpoint Protection provides continuous, updated, and powerful security against the entire spectrum of threats, from zero-day exploits to hacker attacks. As a core component of our Security Connected framework, we provide complete protection for all endpoints, including the latest mobile devices and virtualized environments, ensuring secure, seamless access to business applications and corporate data.






More Information: https://www.mcafee.com/enterprise/en-us/products/endpoint-protection-products.html


Sophos Endpoint blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit.

Sophos Endpoint doesn’t rely on signatures to catch malware, which means it catches zero-day threats without adversely affecting the performance of your device. So you get protection before those exploits even arrive.


More information: https://www.sophos.com/en-us/products/endpoint-antivirus.aspx

Next-generation antivirus + endpoint detection and response (EDR) delivered through a cloud-based endpoint protection platform that consolidates security using a single agent, console, and dataset to stop malware and non-malware attacks.

More information: https://www.carbonblack.com/products/