Hi [[ session.user.profile.firstName ]]

Key Considerations for Selecting Endpoint Security Solutions

Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

Over the past few years things have been changing. Endpoints now, are likely
Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

• The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
• Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
• High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
Recorded May 18 2011
60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
Presentation preview: Key Considerations for Selecting Endpoint Security Solutions
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Considerations for Selecting Endpoint Security Solutions
  • Live at: May 18 2011 3:00 pm
  • Presented by: Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this