Guide Contents
Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense. But while its history is old, the basic problem of protecting the PC on the desk has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply, particularly with the rise of mobility in the majority of endpoint devices and increase in the sophistication of the attacks. In this Essential Guide, learn everything you need to know to develop or refresh your enterprise endpoint strategy.
Strategy
1. Basic endpoint strategies
Endpoint protection certainly still focuses on stopping malware as it attempts to lodge itself on a system, but achieving success at even this basic need requires a well-articulated strategy.
Beyond the Static Scan
2. Ranging beyond basic scanning
Increasingly, IT security professionals recognize that the limitations of traditional static scanning mean that they must rapidly adopt additional protections, such as whitelisting, while at the same time dealing with new environments, such as those employing cloud-based applications.
Mobility
3. When endpoint protection goes mobile
Mobile not only invites traditional endpoint attacks, it also creates new realms of vulnerability in areas such as data loss. At this point, approaches to providing security range all across the board.
Security Management Strategies for the CIO