Top tactics for endpoint security

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured.

This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Attendees will learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network-access control technologies in an organization's identity management program and tips for deploying and endpoint architecture that will cover all access paths.

About the speaker:
Ben Rothke is director of security technology implementation for a large financial services company.

Return to Endpoint security protection: Policies for endpoint control.


  Endpoint protection introduction
  Endpoint security versus perimeter defenses
  The importance of endpoint protection
  Choosing endpoint security suites
  Emerging endpoint security technologies
  Juniper and F5 SSL VPN endpoint security
  Endpoint protection costs
  Top tactics for endpoint security
View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.