WEBINAR: Endpoint Security Beyond The Blacklist

  • Wednesday, July 18, 2012
  • Downloads: 88


Your organization is not safe without endpoint protection. PCs and laptops continue to be the primary entry point for hackers looking to gain entry into a corporate network, so choosing the right endpoint security technologies is a crucial part of any IT security strategy.


  • There is a wide range of fast-changing threats to the user endpoint.
  • The traditional blacklist-based approach, namely anti-virus and anti-malware, is losing effectiveness because the pace at which new threats arise.
  • An effective endpoint strategy seeks to limit exposure to threats first, rather than chase after the latest threats.
  • Intelligent application control and targeted patch management should be essential elements of any company's endpoint security strategy, beyond simple anti-malware, and we'll discuss how to do it.
  • BYOD and enterprise mobility will demand a different treatment to endpoint security in the unmanaged part of your infrastructure.

Related Research

US $250
Become A Client

Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

Already A Client?
Log in to read this webinar.

Technical Information

You’ll receive an email with dialing and WebEx instructions prior to the Webinar.

Webinar FAQs

See the Webinar FAQs for answers to technical and other Webinar questions.