Endpoint Security Fundamentals - Part 2 - Leveraging the Right Enforcement Controls

In today's mobile, always on business environment, as information moves further away from the corporate boundaries to the endpoints, cyber criminals have more opportunities than ever before to gain unauthorized access to valuable data. Endpoints now contain the crown jewels, including financial records, medical records, trade secrets, customer lists, classified information, etc. – which fuels the on-demand business environment, but also creates a dilemma for security professionals.

This is the second of a three part webcast series on Endpoint Security Fundamentals where we examine key enforcement controls that you should look to implement to minimize IT risk and improve your overall security. In Part Two of this series, Leveraging the Right Enforcement Controls, Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension, examine:

  • How to automate the update and patch management process across applications and operating systems to ensure all software is current
  • How to define and enforce standardized and secure endpoint configurations
  • How to effectively layer your defense and the evolving role that application whitelisting plays
  • How to implement USB device control and encryption technologies to protect data

Webcast Request:

*
Already registered? Click here to log in.
*
*
*Country/State
*
*
*
*
*