Top tactics for endpoint security

Top tactics for endpoint security

Top tactics for endpoint security

Date: Jul 24, 2009

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured.

This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Attendees will learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network-access control technologies in an organization's identity management program and tips for deploying and endpoint architecture that will cover all access paths.

About the speaker:
Ben Rothke is director of security technology implementation for a large financial services company.

Return to Endpoint security protection: Policies for endpoint control.


ENDPOINT PROTECTION BEST PRACTICES

  Endpoint protection introduction
  Endpoint security versus perimeter defenses
  The importance of endpoint protection
  Choosing endpoint security suites
  Emerging endpoint security technologies
  Juniper and F5 SSL VPN endpoint security
  Endpoint protection costs
  Top tactics for endpoint security

More on Client security

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: