Description
Your organization is not safe without endpoint protection. PCs and laptops continue to be the primary entry point for hackers looking to gain entry into a corporate network, so choosing the right endpoint security technologies is a crucial part of any IT security strategy.
Agenda:
- There is a wide range of fast-changing threats to the user endpoint.
- The traditional blacklist-based approach, namely anti-virus and anti-malware, is losing effectiveness because the pace at which new threats arise.
- An effective endpoint strategy seeks to limit exposure to threats first, rather than chase after the latest threats.
- Intelligent application control and targeted patch management should be essential elements of any company's endpoint security strategy, beyond simple anti-malware, and we'll discuss how to do it.
- BYOD and enterprise mobility will demand a different treatment to endpoint security in the unmanaged part of your infrastructure.
Technical Information
You'll receive an email with dialing and Webex instructions prior to the Webinar.
Webinar FAQs
See the
Webinar FAQs
for answers to technical and other Webinar questions.