Top tactics for endpoint security

Top tactics for endpoint security

Date: Jul 24, 2009

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured.

This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Attendees will learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network-access control technologies in an organization's identity management program and tips for deploying and endpoint architecture that will cover all access paths.

About the speaker:
Ben Rothke is director of security technology implementation for a large financial services company.

Return to Endpoint security protection: Policies for endpoint control.


ENDPOINT PROTECTION BEST PRACTICES

  Endpoint protection introduction
  Endpoint security versus perimeter defenses
  The importance of endpoint protection
  Choosing endpoint security suites
  Emerging endpoint security technologies
  Juniper and F5 SSL VPN endpoint security
  Endpoint protection costs
  Top tactics for endpoint security

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Malware detection and prevention fundamentals

    VIDEO - Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.
  • canderson

    Revitalizing endpoint security with VDI desktops

    VIDEO - Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren.
  • Identity of Things (IDoT)

    Definition - The Identity of Things (IDoT) is an area of endeavor that involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet. IDoT is an essential component of the Internet of Things (IoT), in which almost anything imaginable can be addressed and networked for exchange of data online.
  • shadow app

    Definition - Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and collaboration (UCC) applications that enable greater productivity in the office.
  • TailsOS

    Definition - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable storage medium. The operating system and associated applications run from the storage device.
  • SmartScreen

    Definition - SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7's Internet Explorer 8, SmartScreen uses a whitelist of trusted sites collected from the surfing data of other IE SmartScreen users.
  • Mobile security market moves away from FUD

    News - Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.

    ( Jul 02, 2014 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: