Security School
-
This page is part of a Security School lesson, featuring a selection of expert technical content on this topic. Explore more in this school:
3. - Endpoint threat protection: Read more in this section
- Endpoint security controls
-
Explore other sections in this guide:
Mastery of endpoint security is a must as enterprises face more and more devices popping up on the network. To gain ground on the increasing number of threats and adversaries, enterprises must choose the right mix of endpoint security controls -- some are legacy offerings, while others are leading- and bleeding-edge alternatives. So, how do you decipher which enterprise endpoint security controls are right for your environment and most effective?
In this podcast, Securosis president and longtime information security industry expert Mike Rothman separates fact from fiction in regard to threat protection and effective enterprise endpoint security controls. He covers how to make the best use of the most reliable endpoint security controls, and how to avoid or move past the ones that prove to be a waste of money and time.
Security Management Strategies for the CIO