BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Tackle endpoint defense issues to obtain the best endpoint security

Last updated:July 2016

Editor's note

Next to perhaps only firewalls, endpoint security figures as the network world's oldest defense focus. But while its history is old, the basic problem of protecting devices has never fully been solved. Rather, the difficulty has increased as the number and kinds of endpoints multiply. Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. But reading this Essential Guide will get you up to speed quickly on everything you need to know to develop a strategy to achieve the best endpoint protection possible, as well as help you in your research and purchase process and the post-purchase management of your new security tool.

1When endpoint protection goes mobile

Mobile not only invites traditional endpoint attacks, it also creates new realms of vulnerability in areas such as data loss. At this point, approaches to providing security range all across the board.

2Endpoint management and incident response

The downside of the best endpoint security system? An overabundance, at times, of security alerts. But there are tools and alternative methods to make this management and response process easier.

3Endpoint protection products and tools

Searching for products that will deliver the best endpoint protection can be complicated. How do you identify the tools suited to your system’s needs? What questions should you ask to whittle down your short list? Read the following to help focus your vendor and product selection process.

4Endpoint glossary

Part of keeping up with developments in endpoint security, and the security field in general, is keeping up with the terminology. In this module we've gathered definitions to the key terms in this ever-changing industry.