Fact or fiction: Endpoint threat protection controls that work

Mike Rothman, Contributor

Mastery of endpoint security is a must as enterprises face more and more devices popping up on the network. To gain ground on the increasing number of threats and adversaries, enterprises must choose the right mix of endpoint security controls -- some are legacy offerings, while others are leading- and bleeding-edge alternatives. So, how do you decipher which enterprise endpoint security controls are right for your environment and most effective?

In this podcast, Securosis president and longtime information security industry expert Mike Rothman separates fact from fiction in regard to threat protection and effective enterprise endpoint security controls. He covers how to make the best use of the most reliable endpoint security controls, and how to avoid or move past the ones that prove to be a waste of money and time.

 

View the next item in this Essential Guide: Endpoint security controls: Test your knowledge or view the full guide: Endpoint security controls: Moving beyond antivirus

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: