Security School

This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.

Endpoint security controls: Moving beyond antivirus

Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.

Security School LogoEndpoint security controls cannot be just about antivirus anymore. Organizations need to understand not only malware protection, but what devices and applications can and should be allowed to run on an endpoint. This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring and SIM and log management solutions.

Webcast

1. Evolving endpoint protection

In this presentation, Mike Rothman discusses today’s next-generation endpoint data security and integration of endpoint technology and explains how endpoint data security has evolved over time.

Tip

2. Rethink defense-in-depth for BYOD

Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised.

Podcast

3. Endpoint threat protection

There are plenty of effective endpoint security controls out there for threat protection, but how do you decipher which technologies are right for your environment and will be most effective?

Quiz

4. Test your knowledge

Take this five-question quiz to see if you've mastered your understanding of the important endpoint security controls and how to use them successfully for defense-in-depth threat protection.

Take the quiz

Expert

5. About the expert

Learn more about the author of this Security School, Mike Rothman, and view his collection of videos and technical tips.

  • eGuide Cover
    Mike Rothman, Contributor

    Mike Rothman is President and Principal Analyst of Securosis, an independent information security research firm. Having spent more than 15 years as an advocate for global enterprises and midsized businesses, Mike's role is to educate and stimulate thought provoking discussion on how information security contributes to core business imperatives.

    Expert