Glossary: Endpoint Management

Application Whitelisting

Application whitelisting is a security practice that allows only approved and specified applications to run on endpoint devices. This helps prevent the execution of unauthorized or malicious applications, enhancing overall security.

Asset Management

Asset management involves tracking and managing all endpoint devices within an organization. It helps organizations maintain an inventory of hardware and software assets, ensuring efficient resource utilization and compliance with licensing agreements.


Containerization is a technology that encapsulates applications and their dependencies into isolated containers. It enhances endpoint security by isolating applications from each other, reducing the impact of security vulnerabilities on the overall system.

Device Configuration Management

Device configuration management involves maintaining and enforcing consistent configurations across endpoint devices. It ensures that devices adhere to security policies and standards, reducing the risk of misconfigurations that could lead to security vulnerabilities.

Disk Encryption

Disk encryption involves encrypting the data stored on endpoint device hard drives. In the event of device loss or theft, encrypted data remains inaccessible without the proper decryption key, safeguarding sensitive information.


An endpoint refers to a user device, such as a computer, laptop, smartphone, or tablet, that communicates with a network. Endpoint management involves overseeing and controlling these devices to ensure security, compliance, and optimal performance.

Endpoint Backup

Endpoint backup involves regularly backing up data stored on endpoint devices to prevent data loss in the event of device failure, loss, or a security incident. It ensures that critical data is recoverable and minimizes downtime.

Endpoint Compliance

Endpoint compliance ensures that devices adhere to security policies, regulations, and industry standards. Continuous monitoring and enforcement of compliance help organizations maintain a secure and regulated IT environment.

Endpoint Detection and Response (EDR)

EDR is a security solution that focuses on detecting and responding to advanced threats on endpoints. It monitors endpoint activities, identifies suspicious behavior, and provides real-time response capabilities to mitigate potential security incidents.

Endpoint Management

Endpoint management involves the administration and control of end-user devices within a network. It includes tasks such as software deployment, security enforcement, configuration management, and monitoring to ensure the health and security of individual endpoints.

Endpoint Security

Endpoint security focuses on protecting individual devices from cyber threats. It includes antivirus software, firewalls, intrusion detection systems, and other measures to safeguard endpoints against malware, ransomware, and other malicious activities.


Geofencing is a location-based security measure that establishes virtual boundaries around geographical areas. It can be used in endpoint management to enforce specific security policies or restrict access based on the physical location of endpoint devices.

Inventory Management

Inventory management in the context of endpoint management involves keeping track of hardware and software assets on individual devices. This includes monitoring changes, updates, and configurations to maintain accurate records of endpoint inventories

Mobile Device Management (MDM)

MDM is a solution for managing and securing mobile devices (smartphones, tablets) within an organization. It includes functionalities like device enrollment, application distribution, and remote wipe capabilities to protect sensitive data on mobile endpoints.

Network Access Control (NAC)

NAC is a security solution that controls access to a network based on the security posture of endpoint devices. It ensures that only compliant and properly configured devices can access the network, reducing the risk of unauthorized access.

Patch Management

Patch management involves the process of identifying, deploying, and maintaining software updates (patches) on endpoint devices. This ensures that operating systems and applications are up-to-date, reducing the risk of vulnerabilities being exploited by attackers.

Remote Desktop Management

Remote desktop management allows IT administrators to monitor, troubleshoot, and perform maintenance tasks on endpoints from a central location. This is especially useful for supporting remote users and maintaining devices in geographically dispersed locations.

Unified Endpoint Management (UEM)

UEM is an integrated approach to managing and securing various types of endpoints, including computers, mobile devices, and Internet of Things (IoT) devices. It streamlines management tasks through a single console, providing a comprehensive solution for IT administrators.

User and Entity Behavior Analytics (UEBA)

UEBA is a security solution that analyzes the behavior of users and entities on endpoint devices to detect abnormal or malicious activities. It helps identify potential security threats based on deviations from normal behavioral patterns.

Zero Trust Endpoint Security

Zero Trust Endpoint Security is a security model that assumes no inherent trust in endpoints, requiring continuous verification of device identity and security posture. This model helps organizations defend against evolving cyber threats and insider risks.



Altourage is a client-obsessed managed service provider. We offer IT Support Services, Cybersecurity Solutions, Cloud & Infrastructure Management and Digital Business Transformation Consulting to trailblazing companies in the ‘High Trust’ sectors, with a focus on the Financial Services, Legal, Nonprofit. and Tech sectors.

Our highest purpose is creating true partnerships with our clients. To do so, we purposefully select dedicated teams of engineers, project managers, help desk analysts, and client success professionals that become a true extension of our clients’ organizations. VISIT: WWW.ALTOURAGE.COM

To learn more about how we can help your company develop and execute a comprehensive cybersecurity strategy, reach out to us Contact us today: