The endpoint data security revolution: Going beyond antivirus

It has never been more crucial for an enterprise to ensure that its endpoint protection strategy is sound. Organizations must move beyond trusting endpoint security to outdated, ineffective signature-based antimalware systems, and instead look toward a mix of new and evolving technologies. It is also essential to determine what devices and applications should be allowed to run on an endpoint, define that determination in a policy and use technology to support and enforce it.

In this video, Mike Rothman, president of information security consulting firm Securosis LLC, discusses these important considerations. Rothman looks at how endpoint data security has evolved over time and covers some of the latest advancements in endpoint protection. He examines next-generation endpoint defense and control options and their ability to stop attackers at the original point of attack. Rothman also explores the integration of endpoint technology with other advanced forensics tools and malware controls and their role in a contemporary endpoint security strategy.

View All Videos

Security School

Endpoint security controls: Moving beyond antivirus

SECURITY SCHOOL SECTIONS

  1. Webcast
  2. Tip
  3. Podcast
  4. Quiz
  5. Expert

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close