Mobile endpoint security: What enterprise infosec pros must know now
A comprehensive collection of articles, videos and more, hand-picked by our editors
From server-based endpoint security suites and directory-based group policy compliance checks to appliances and network-based access controls like TNC and NAP, this video explores the many endpoint integrity scan, quarantine, and remediation options available for today's increasingly diverse on-the-go device population. Learn about:
• the pros and cons of each endpoint integrity enforcement approach,
• the kinds of checks, controls, and endpoints they can support,
• a sampling of products and platforms that incorporate them, and
• how to choose the right product(s) to meet your workforce needs.
After watching this video, you'll have a firm grounding in the latest in endpoint integrity enforcement and the questions you should ask vendors and groups within your own organization to stop infected, non-compliant endpoints from threatening your business.