Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Endpoint Management Strategies and Best Practices

    The job of an IT administrator has become a lot more challenging today than what it once was. IT has evolved from a controlled endpoint environment behind four walls to thousands of islands of information scattered about an organization that must be ... 

  • application performance monitoring (APM)

    Application performance monitoring, also called app monitoring, is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a... 

  • desktop personalization

    Desktop personalization is the process of adjusting the look, feel and organization of a Windows end-user experience. 

  • prefetch folder (PF)

    A Windows prefetch folder is a specific location within Windows XP and later computers that contains a series of small files detailing the startup activities and frequently-used applications. 

  • Windows Imaging Format (WIM)

    The Windows Imaging Format (or WIM) is used for the creation and distribution of disk image files. 

  • BIOS password

    A BIOS password is a security precaution that requires a computer user to log into the machine's basic input/output system (BIOS) before a computer will boot up. 

  • endpoint security

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. 

  • system tray

    The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user interface that is used to display the clock and the icons of certain programs so that a user is continually reminded that they are there and can easily ... 

About Endpoint security management tools

A proper set of tools can be the difference between a fully operational desktop deployment and an under-performing collection of paper weights. The free tools discussed in the Windows security tools section can help you automate patch management in Windows, fight malware infections and test the security of your desktop machines.