{"id":22658,"date":"2022-05-23T14:56:12","date_gmt":"2022-05-23T21:56:12","guid":{"rendered":"https:\/\/tpx2025.wpenginepowered.com\/?page_id=22658"},"modified":"2025-04-25T16:19:42","modified_gmt":"2025-04-25T20:19:42","slug":"endpoint-security","status":"publish","type":"page","link":"https:\/\/www.tpx.com\/learn\/endpoint-security\/","title":{"rendered":"What is Endpoint Security?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22658\" class=\"elementor elementor-22658\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c79ee7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"2c79ee7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-acfee6e\" data-id=\"acfee6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29a27d4 elementor-widget elementor-widget-heading\" data-id=\"29a27d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is Endpoint Security? A Complete Guide<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a7720cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7720cd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7b26d59\" data-id=\"7b26d59\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-88a8cd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88a8cd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6aa67f2\" data-id=\"6aa67f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2971e5 elementor-widget elementor-widget-heading\" data-id=\"b2971e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpoint Security Topics<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-99bce78\" data-id=\"99bce78\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6024692 elementor-widget elementor-widget-image\" data-id=\"6024692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"377\" src=\"https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/05\/How-Endpoint-Management-Works-1024x482.png.webp\" class=\"attachment-large size-large wp-image-23555\" alt=\"How Endpoint Security Works\" srcset=\"https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/05\/How-Endpoint-Management-Works-1024x482.png.webp 1024w, https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/05\/How-Endpoint-Management-Works-300x141.png.webp 300w, https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/05\/How-Endpoint-Management-Works-768x362.png.webp 768w, https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/05\/How-Endpoint-Management-Works.png.webp 1266w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd62d7 elementor-widget elementor-widget-heading\" data-id=\"2dd62d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Endpoint Security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a9755d elementor-widget elementor-widget-text-editor\" data-id=\"6a9755d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"\/services\/managed-security\/endpoint-security\/\" target=\"_blank\" rel=\"noopener\">Endpoint security<\/a> involves protecting the various devices people connect to networks, such as desktops, laptops, mobile devices, and a wide assortment of internet of Things (IoT) devices from cyberattacks.<\/p><p>In some ways, endpoint security is different from older, traditional models that focus on setting up a security perimeter around an organization\u2019s network. While this can sometimes be effective, it doesn\u2019t protect every way a cybercriminal can enter an organization\u2019s infrastructure. Endpoint security provides an additional layer of protection than just using a firewall alone and devotes attention to the activity of individual endpoints, including how, when, and where they connect, who\u2019s using them, and the types of data entering each device.<\/p><h3>More Than Perimeter Protection<\/h3><p>With endpoint security, you not only get some perimeter protection, but you can also monitor the behavior and transmissions of individual computers, mobile, and IoT devices. In this way, you can even prevent threats at the device level before they ever enter your network security perimeter.<\/p><p>While the IT department has set up a firewall, many threats can bypass firewall protection alone. If a zero-day attack occurs without an endpoint security solution in place, the firewall would be the only protection the fulfillment company has. Fortunately, Your Goods, Inc. has an endpoint security system. It detects abnormal activity on the user\u2019s scanner, throws the malware into a sandbox, and triggers an alert, which enables the threat response team to take action to safeguard the rest of the network.<\/p><p>Without endpoint security measures in place, the threat may have been able to spread, but because each IoT device was being monitored, it was contained, and downtime was either eliminated or minimized.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd26572 elementor-widget elementor-widget-heading\" data-id=\"fd26572\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Endpoint Security Works<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458fa4e elementor-widget elementor-widget-text-editor\" data-id=\"458fa4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An endpoint security solution works by protecting the workflows and data of individual devices that connect to your network. This is done by examining the data that comes into your network and then comparing it against a database of information about different threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-07c1475 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07c1475\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b1d29d9\" data-id=\"b1d29d9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-610f081 elementor-widget elementor-widget-heading\" data-id=\"610f081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0fcb8f elementor-widget elementor-widget-text-editor\" data-id=\"b0fcb8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tClick here to learn more on <a href=\"\/learn\/endpoint-security\/how-endpoint-security-works\/\" rel=\"noopener\">how endpoint security works<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e18a2b elementor-widget elementor-widget-heading\" data-id=\"6e18a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Endpoint Protection is Important<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b76118 elementor-widget elementor-widget-text-editor\" data-id=\"4b76118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Endpoint protection is important because it gives you more precise control over your digital environment. When compared to an endpoint security solution, a perimeter security system is like a party with one bouncer at the door versus one where everyone has their own bodyguard. Even if a threat were to sneak in, it would also have to bypass each individual endpoint&#8217;s security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-56af9b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56af9b2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a54fa34\" data-id=\"a54fa34\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75f9250 elementor-widget elementor-widget-heading\" data-id=\"75f9250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daad681 elementor-widget elementor-widget-text-editor\" data-id=\"daad681\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tClick here for more on <a href=\"\/learn\/endpoint-security\/why-endpoint-protection-is-important\/\" rel=\"noopener\">why endpoint protection is important<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f408533 elementor-widget elementor-widget-heading\" data-id=\"f408533\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What an Endpoint Management Solution Does<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-315c83b elementor-widget elementor-widget-text-editor\" data-id=\"315c83b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An endpoint management solution empowers you to track device activity and manage device software, and monitor and report what each device does. You can also use it to remotely control devices, whether for troubleshooting or operational purposes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1d702e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d702e5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b853a6a\" data-id=\"b853a6a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c69d5ec elementor-widget elementor-widget-heading\" data-id=\"c69d5ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de59b54 elementor-widget elementor-widget-text-editor\" data-id=\"de59b54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCheck out our in-depth article on <a href=\"\/learn\/endpoint-security\/what-an-endpoint-management-solution-does\/\" rel=\"noopener\">what an endpoint management solution does<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-350af09 elementor-widget elementor-widget-heading\" data-id=\"350af09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Types of Endpoint Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a26977 elementor-widget elementor-widget-text-editor\" data-id=\"6a26977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While there are many types of endpoint security, here are some of the most common:<\/p><ul><li><strong>Network Access Control (NAC)<\/strong>. NAC involves the management of users and devices for the purpose of controlling which networks or network segments they\u2019re able to interact with.<\/li><li><strong>Internet-of-Things (IoT) Security<\/strong>. IoT endpoint security protects IoT devices, which depend on an internet connection that hackers sometimes seek to exploit.<\/li><li><strong>Insider threat protection.<\/strong> Insider threat protection involves keeping unauthorized users from accessing certain areas of your network. It also incorporates technology that tracks user activity as they use endpoints connected to your network.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8a53243 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a53243\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1846562\" data-id=\"1846562\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4486bfa elementor-widget elementor-widget-heading\" data-id=\"4486bfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56a1741 elementor-widget elementor-widget-text-editor\" data-id=\"56a1741\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCheck out the full detailed list of <a href=\"\/learn\/endpoint-security\/types\/\" rel=\"noopener\">types of endpoint security<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f1dea elementor-widget elementor-widget-heading\" data-id=\"74f1dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Difference Between Endpoint Security Software vs. Antivirus Software<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89a5ef4 elementor-widget elementor-widget-text-editor\" data-id=\"89a5ef4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Endpoint security software can consist of a range of protective tools, while antivirus software only finds and eliminates viruses and other kinds of malware. Antivirus software can be a component of an endpoint security system, but if it comprised the entire solution, you would need additional measures to keep your network secure.<\/p><p>For example, with endpoint security software, you can prevent a device from accessing a malicious website that downloads malware on the devices of users that visit it. Antivirus software can identify a virus once it\u2019s been downloaded, but it can\u2019t always prevent it from being downloaded in the first place.<\/p><p>If all an endpoint had was antivirus software, a user could download a virus, then connect to another network and infect computers on that network with the virus. If their antivirus software ran after they had connected to the other network, it would be too late; the damage would have already been done. But endpoint security could have prevented the attack in the first place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c0c6c3 elementor-widget elementor-widget-heading\" data-id=\"3c0c6c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Core Functionality of an Endpoint Security Solution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c873ba elementor-widget elementor-widget-text-editor\" data-id=\"4c873ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An endpoint security solution performs several core functions that, when combined, keep your endpoints and the networks they connect to safer. These include:<\/p><ul><li>Malware prevention using next-generation antivirus technology<\/li><li>Threat detection via an endpoint detection and response (EDR) system<\/li><li>Threat hunting<\/li><li>Threat intelligence integration<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-99314ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"99314ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b577871\" data-id=\"b577871\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3539db elementor-widget elementor-widget-heading\" data-id=\"f3539db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22d9b8c elementor-widget elementor-widget-text-editor\" data-id=\"22d9b8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLearn more about the <a href=\"\/learn\/endpoint-security\/core-functionality\/\" rel=\"noopener\">core functionality of an endpoint security solution<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-350af75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"350af75\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8594ca9\" data-id=\"8594ca9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf48f9 elementor-widget elementor-widget-heading\" data-id=\"7bf48f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Need to strengthen your endpoint security?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0a450 elementor-widget elementor-widget-text-editor\" data-id=\"7c0a450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We can help! Get in touch with us below to speak to one of our experts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f87085 elementor-widget elementor-widget-text-editor\" data-id=\"2f87085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!DOCTYPE html><html><head><meta charset='UTF-8' \/><\/head><body class='GF_AJAX_POSTBACK'><p class=\"gform_not_found\">Oops! We could not locate your form.<\/p><\/body><\/html>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5111da2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5111da2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ea893c\" data-id=\"8ea893c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7959b66 elementor-widget elementor-widget-html\" data-id=\"7959b66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\r\njQuery('.ginput_recaptcha').each(function(i)\r\n{\r\n    var thisID = jQuery(this).attr('id');\r\n    jQuery(this).attr('id', thisID+'_'+i);\r\n});\r\n<\/script>\r\n<style>\r\ninput[id^=\"gform_submit_button_\"] {\r\n    background-color: #70BF54 !important;\r\n    color: #fff !important;\r\n}\r\ninput[id^=\"gform_submit_button_\"]:hover {\r\n    background-color: #0079C2 !important;\r\n    color: #fff !important;\r\n}\r\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Endpoint Security? A Complete Guide Endpoint Security Topics 1 How Endpoint Security Works 2 Why Endpoint Protection is Important 3 What an Endpoint [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23548,"parent":16948,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"resources-tags":[611],"class_list":["post-22658","page","type-page","status-publish","has-post-thumbnail","hentry","resources-tags-learning"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/22658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/comments?post=22658"}],"version-history":[{"count":0,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/22658\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/16948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media\/23548"}],"wp:attachment":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media?parent=22658"}],"wp:term":[{"taxonomy":"resources-tags","embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/resources-tags?post=22658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}