Essential Guide

This Essential Guide is a collection of articles, videos and other content selected by our editors to give you a comprehensive view of this topic.

Tackling the ongoing problem of endpoint defense

We're well past a blind reliance on antivirus scanning at the endpoint, but there's also not yet consensus on which next steps are a must and which are just nice to have. Here's your guide through the endpoint thicket.

Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense. But while its history is old, the basic problem of protecting the PC on the desk has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply, particularly with the rise of mobility in the majority of endpoint devices and increase in the sophistication of the attacks. In this Essential Guide, learn everything you need to know to develop or refresh your enterprise endpoint strategy.


1. Basic endpoint strategies

Endpoint protection certainly still focuses on stopping malware as it attempts to lodge itself on a system, but achieving success at even this basic need requires a well-articulated strategy.

Beyond the Static Scan

2. Ranging beyond basic scanning

Increasingly, IT security professionals recognize that the limitations of traditional static scanning mean that they must rapidly adopt additional protections, such as whitelisting, while at the same time dealing with new environments, such as those employing cloud-based applications.


3. When endpoint protection goes mobile

Mobile not only invites traditional endpoint attacks, it also creates new realms of vulnerability in areas such as data loss. At this point, approaches to providing security range all across the board.