Endpoints are any nodes or devices which connect or access network services including:

Stationary, Workstations, Printers, Mobile, Laptops, Telephones, Smart Phones, Tablet Computers, Portable Digital Assistants or PDAs, USBs, DigitalCameras, RFIDs, Infrared-enabled devices such as printers and smart cards

Securing the data at the “Endpoint” is Endpoint Security

The Benefits of End-point Security

Providing Protection Against

  • Malware – “any software or code developed for the purpose of compromising or harming information assets without the owner ’s informed consent”
  • Hacking – “all attempts to intentionally access or harm information assets without (or in excess of) authorization by thwarting logical security mechanisms”
  • Social – “tactics employing deception, manipulation, intimidation, etc. to exploit the human element, or users, of information assets”
  • Misuse – “using organizational resources or privileges in a manner contrary to that which was intended”
  • Physical – “human-driven threats that employ physical actions and/or require physical proximity”
  • Error – “anything done (or left undone) incorrectly or inadvertently”
  • Environmental – “natural hazards (floods, earthquakes..)and infrastructure related (power failures, pipe leaks..)

Enterprise Security for Endpoints

Provides flexible, strong protection for file servers, desktops, laptops, and mobile devices with innovative technology that frees endpoint resource.

Enterprise Security Suite

Delivers centrally managed security with adaptive protection and faster performance—protecting from gateway to endpoint so you can confidently drive your business forward.

Enterprise Security for Endpoints and Mail Servers

Offers multi-threat protection for mail and file servers, desktops, laptops, and mobile devices.

Endpoint Encryption

Fully encrypts your data at rest on desktops, laptops, files, folders and removable media such as CDs, DVDs, and USB drives. Endpoint encryption protects your data if your device is lost or stolen, and prevents unauthorized access and data breach.

Endpoint Security Solutions

TrendMicro Officescan
McAfee Endpoint Protection
Symantec Endpoint Protection
Kaspersky Endpoint Protection

Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilization.







More Information: https://www.trendmicro.com/en_us/business/products/user-protection/sps/endpoint.html



McAfee Endpoint Protection provides continuous, updated, and powerful security against the entire spectrum of threats, from zero-day exploits to hacker attacks. As a core component of our Security Connected framework, we provide complete protection for all endpoints, including the latest mobile devices and virtualized environments, ensuring secure, seamless access to business applications and corporate data.






More Information: https://www.mcafee.com/enterprise/en-us/products/endpoint-protection-products.html


Endpoint Protection has unrivaled Security, Blazing Performance and
support for Virtual Environments. By layering technologies like Insight and SONAR, antivirus scans are reduced and maximum performance is achieved while stopping cybercriminals and even zero-day threats in their tracks.






More Information: https://www.symantec.com/products/endpoint-protection

Kaspersky Endpoint Security 8 for Windows replaces both Kaspersky Anti-Virus 6.0 for Windows Workstations and Kaspersky Ant-Virus 6.0 for Windows Servers. One installation package will work on both hardware devices.

More Information: https://www.kaspersky.com/