Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense. But while its history is old, the basic problem of protecting the PC on the desk has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply, particularly with the rise of mobility in the majority of endpoint devices and increase in the sophistication of the attacks. In this Essential Guide, learn everything you need to know to develop or refresh your enterprise endpoint strategy.
Basic endpoint strategies
Endpoint protection certainly still focuses on stopping malware as it attempts to lodge itself on a system, but achieving success at even this basic need requires a well-articulated strategy.
Worried that your enterprise endpoints may be harboring sensitive information like credit card numbers or Social Security numbers? Fear not. Mike Chapple offers algorithms and tools to conduct a search and advice on dealing with the results. Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Enforcing endpoint security requires careful planning and deployment. Continue Reading
Network access control is dead. Long live endpoint visibility, access and security. New acronym, slightly different product. Continue Reading
2Beyond the Static Scan-
Ranging beyond basic scanning
Increasingly, IT security professionals recognize that the limitations of traditional static scanning mean that they must rapidly adopt additional protections, such as whitelisting, while at the same time dealing with new environments, such as those employing cloud-based applications.
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed. Continue Reading
Mike Chapple details discuses considerations for using cloud security services, specifically cloud endpoint security. Continue Reading
This endpoint protection tutorial discuss several aspects of endpoint protection, including how to use endpoint fingerprinting, how to create an endpoint security lifecycle, how to solve problems related to insecure endpoints. Continue Reading
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
When endpoint protection goes mobile
Mobile not only invites traditional endpoint attacks, it also creates new realms of vulnerability in areas such as data loss. At this point, approaches to providing security range all across the board.
A Gartner analyst says enterprise BYOD -- specifically iOS and Android devices -- presents many pros and cons for enterprise endpoint security. Continue Reading