Hi {{ session.user.profile.firstName }}

E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints

Manage webcast
Paul Henry, Security & Forensics Analyst; Eric Ogren, Founder/Principal Analyst, Ogren Group; Doug Walls, CTO, EM Solutions
IT security professionals rank third-party application vulnerabilities as the greatest security risk of 2012. And yet malware continues to exploit these – and other – vulnerabilities to breach our defenses. Clearly there’s a disconnect between knowing the problem and solving it. Yet it does not have to be this way, if we intelligently apply adequate protections against the exploitation of these vulnerabilities.

Join this webcast, led by expert IT security panelists, to learn:

•What are the vital layers of your endpoint defense.
•How to thwart exploitation of your endpoint OS, configuration and 3rd-party application vulnerabilities.
•How to prevent unknown applications from executing on your systems.
May 9 2012
60 mins
E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints
More from this community:

IT Governance, Risk and Compliance

  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints
  • Live at: May 9 2012 3:00 pm
  • Presented by: Paul Henry, Security & Forensics Analyst; Eric Ogren, Founder/Principal Analyst, Ogren Group; Doug Walls, CTO, EM Solutions
  • From:
Your email has been sent.
or close
You must be logged in to email this