Endpoint Security Fundamentals eBook and Webcast Series


In today's mobile, always on business environment, as information moves further away from the corporate boundaries to the endpoints, cyber criminals have more opportunities than ever before to gain unauthorized access to valuable data. Endpoints now contain the crown jewels, including financial records, medical records, trade secrets, customer lists, classified information, etc. – which fuels the on-demand business environment, but also creates a dilemma for security professionals.


This eBook and webcast series on Endpoint Security Fundamentals provides the strategies organizations need to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity. Experts who will lead the discussion are Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension. Listen to Mike Rothman’s podcast here.


Add to Del.cio.us Tweet This Add to Technorati Favorites Stumble It! Digg It!

Chapter 1: Finding and Fixing the Leaky Buckets  Watch the On-Demand Webcast

In Chapter 1 of this webcast and eBook series, we discuss the first steps to understanding your IT risk and gain the visibility to set up a healthy endpoint security program.

In this chapter:

  • The fundamental steps you should take before implementing security enforcement solutions
  • How to effectively prioritize your IT risks, so that you are focusing on what matters most
  • How to act on the information that you gather through your assessment and prioritization efforts
  • How to get some "quick wins" and effectively communicate with your senior management

Chapter 2: Leveraging the Right Enforcement Controls  Watch the On-Demand Webcast

In Chapter 2 of our webcast and eBook series, we examine key enforcement controls that you should look to implement to minimize IT risk and improve your overall security.

In this chapter:

  • How to automate the update and patch management process across applications and operating systems to ensure all software is current
  • How to define and enforce standardized and secure endpoint configurations
  • How to effectively layer your defense and the evolving role that application whitelisting plays
  • How to implement USB device control and encryption technologies to protect data

Chapter 3: Building the Endpoint Security Program  Watch the On-Demand Webcast

In the final Chapter of our webcast and eBook series, we take the steps and enforcement controls discussed from Chapters 1 and 2 of the series and discuss how to meld them into a program.

In this chapter:

  • How to manage expectations and define success
  • How to effectively train your users about policies and how to ensure two-way communication to evolve policies as needed
  • How to effectively respond to incidents when they occur to minimize potential damage
  • How to document and report on your overall security and IT risk posture