Endpoint Security Technology: A 360° View of the Buying Process

While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it’s probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major endpoint players do a fairly good job at detecting traditional virus attacks. But more importantly, endpoints aren’t only about antivirus anymore. Endpoint protection uses tools like behavioral analysis, host-based intrusion prevention (HIPS), patch and configuration management, whitelisting, network access control, and data loss prevention. Increasingly, these tools are deployed as part of single-vendor suite, which on the one hand narrows the field, but on the other makes it difficult to make meaningful side-by-side comparisons. In this series we take an independent look at the options, help you focus on your particular priorities, and look at product and solution features that can help implement endpoint security and offer advice on how to make the final buying decision.

Exclusive Download: Endpoint Security Technology - A 360° View of the Buying Process

Thank you for participating in our survey and providing us with a 360° view of your endpoint security initiatives. Not only do your responses help our editorial team create content that addresses both your current concerns and future plans, but your participation qualifies you for exclusive access to this expert guide as well. 

Only available to those who have taken the time to thoughtfully complete our survey, the ediors of SearchSecurity.com have completed an exclusive guide taking you through the endpoint security technology buying process. Download this reference guide now to be sure you don't miss out on the invaluable advice it holds. 



This was last published in October 2013

Dig Deeper on Information security program management

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Appliances and software can be a great tool for security but policy enforcement and human defence is the biggest problem