ON-DEMAND Webinar

Endpoint Security Beyond The Blacklist

Original Broadcast Date:Jul 18th, 2012
CW
Chenxi WangVice President, Principal Analyst
CS
Chris ShermanSenior Analyst
Email
LinkedIn
X (formerly Twitter)

Log in to watch this webinar

Client log in

Welcome back. Log in to your account to continue.


Become a client

Become a client today for these benefits:

  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.


Purchase this webinar

This webinar is available for purchase ($250).

Description

Your organization is not safe without endpoint protection. PCs and laptops continue to be the primary entry point for hackers looking to gain entry into a corporate network, so choosing the right endpoint security technologies is a crucial part of any IT security strategy.

Agenda:

  • There is a wide range of fast-changing threats to the user endpoint.
  • The traditional blacklist-based approach, namely anti-virus and anti-malware, is losing effectiveness because the pace at which new threats arise.
  • An effective endpoint strategy seeks to limit exposure to threats first, rather than chase after the latest threats.
  • Intelligent application control and targeted patch management should be essential elements of any company's endpoint security strategy, beyond simple anti-malware, and we'll discuss how to do it.
  • BYOD and enterprise mobility will demand a different treatment to endpoint security in the unmanaged part of your infrastructure.

Technical information

You'll receive an email with dialing and Webex instructions prior to the Webinar.

Webinar FAQs

See the Webinar FAQs for answers to technical and other Webinar questions.