Security School Contents
Endpoint security controls cannot be just about antivirus anymore. Organizations need to understand not only malware protection, but what devices and applications can and should be allowed to run on an endpoint. This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring and SIM and log management solutions.
1. Evolving endpoint protection
In this presentation, Mike Rothman discusses today’s next-generation endpoint data security and integration of endpoint technology and explains how endpoint data security has evolved over time.
2. Rethink defense-in-depth for BYOD
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised.
3. Endpoint threat protection
There are plenty of effective endpoint security controls out there for threat protection, but how do you decipher which technologies are right for your environment and will be most effective?
4. Test your knowledge
Take this five-question quiz to see if you've mastered your understanding of the important endpoint security controls and how to use them successfully for defense-in-depth threat protection.
5. About the expert
Learn more about the author of this Security School, Mike Rothman, and view his collection of videos and technical tips.