This Content Component encountered an error

Identity and Access Management Security School

Endpoint security protection: Policies for endpoint control <<previous|next>> :Endpoint security quiz

Top tactics for endpoint security

Top tactics for endpoint security

date:Jul 24, 2009

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured.

This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Attendees will learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network-access control technologies in an organization's identity management program and tips for deploying and endpoint architecture that will cover all access paths.

About the speaker:
Ben Rothke is director of security technology implementation for a large financial services company.

Return to Endpoint security protection: Policies for endpoint control.


ENDPOINT PROTECTION BEST PRACTICES

  Endpoint protection introduction
  Endpoint security versus perimeter defenses
  The importance of endpoint protection
  Choosing endpoint security suites
  Emerging endpoint security technologies
  Juniper and F5 SSL VPN endpoint security
  Endpoint protection costs
  Top tactics for endpoint security

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.

    ( Dec 13, 2013 )

  • canderson

    Malware detection and prevention fundamentals

    VIDEO - Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.

    ( Jun 26, 2012 )

  • canderson

    Revitalizing endpoint security with VDI desktops

    VIDEO - Implementing VDI desktops provides an opportunity to re-architech endpoint security and management. Learn how in this supercast with Eric Ogren.

    ( Nov 07, 2011 )

  • Sandboxing security: A cure-all strategy for virtual environments?

    Answer - Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments.

    ( Apr 11, 2014 )

  • Experts: Merely ousting Bennett won't solve Symantec strategy problems

    News - Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security.

    ( Mar 21, 2014 )

  • Cut Microsoft admin rights to mitigate 92% of threats, study shows

    Cut Microsoft admin rights to mitigate 92% of threats, study shows

    News - Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013

    ( Feb 18, 2014 )

  • Roots of Trust (RoT)

    Definition - Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor on the PC or mobile device it is embedded in.

    ( Jan 29, 2014 )

  • password blacklist

    Definition - A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard substitutions or numbers following the words.

    ( Jan 28, 2014 )