Endpoint Security Technology: A 360° View of the Buying Process

While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it’s probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major endpoint players do a fairly good job at detecting traditional virus attacks. But more importantly, endpoints aren’t only about antivirus anymore. Endpoint protection uses tools like behavioral analysis, host-based intrusion prevention (HIPS), patch and configuration management, whitelisting, network access control, and data loss prevention. Increasingly, these tools are deployed as part of single-vendor suite, which on the one hand narrows the field, but on the other makes it difficult to make meaningful side-by-side comparisons. In this series we take an independent look at the options, help you focus on your particular priorities, and look at product and solution features that can help implement endpoint security and offer advice on how to make the final buying decision.

Exclusive Download: Endpoint Security Technology - A 360° View of the Buying Process

Thank you for participating in our survey and providing us with a 360° view of your endpoint security initiatives. Not only do your responses help our editorial team create content that addresses both your current concerns and future plans, but your participation qualifies you for exclusive access to this expert guide as well. 

Only available to those who have taken the time to thoughtfully complete our survey, the ediors of SearchSecurity.com have completed an exclusive guide taking you through the endpoint security technology buying process. Download this reference guide now to be sure you don't miss out on the invaluable advice it holds. 

 

 

This was first published in October 2013

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close