Pro+ Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
September 2013

Developing your endpoint security management transition plan

Sponsored by SearchSecurity.com

This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based malware defense and signature-based antivirus with new malware-detection technologies, ensuring Web security gateways provide an effective additional content-filtering layer to serve as endpoints’ first line of defense and deciding whether whitelisting is a viable technology to deploy at the endpoint.

Table Of Contents

  • Web-based malware
  • Web gateway implementation
  • Application whitelisting

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close