Enterprise endpoint security fundamentals

When times are tight, we’re all called upon to make more efficient use of the financial and human resources under our control.  Chances are you’ve been asked to take a hard look at your security budget over the past year and identify areas where you can make sacrifices to improve the bottom line.  In this video, we take a “back to basics” look at endpoint security in the enterprise and help you identify the truly critical components of your enterprise security program, answering such questions as:

  • What’s the current and future value of antivirus subscription services? How do the costs measure up to the benefits?
  • What about endpoint encryption?  It’s complicated to implement and difficult to quantify the return on my investment.  Is it really worth it?
  • How can I keep tabs on the sensitive data that my users are storing on mobile computers?  Are there cost-effective solutions to scan them for sensitive information?

Editor's note: See more content from SearchSecurity.com's Integration of Networking and Security School lesson, Back to basics: Endpoint security on a budget.


About the expert:
Mike Chapple, CISSP, is an IT security professional with the University of Notre Dame.

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.








  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...