A | B | C | D | E | I | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z


An endpoint refers to any device outside the corporate firewall, including servers, workstations, smartphones, and tablets used to connect to the organization’s infrastructure. Endpoints represent vulnerable and lucrative points of entry for cybercriminals as they can be used to execute code and exploit vulnerabilities. With organizational workforces becoming more mobile and users connecting to internal resources from off-premise endpoints all over the world, endpoints are increasingly susceptible to attacks and need to be properly secured.

Enterprise Mobility Management (EMM) is a set of services and technologies designed to prevent unauthorized access to enterprise applications and corporate data on employees' mobile devices. EMM enables organizations to centrally manage and enforce security policies, encrypt storage, and remotely delete all data from misplaced devices.