Hi {{ session.user.profile.firstName }}

Key Considerations for Selecting Endpoint Security Solutions

Manage webcast
Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

• The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
• Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
• High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
May 24 2011
60 mins
Key Considerations for Selecting Endpoint Security Solutions
More from this community:

Virtualization

  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Considerations for Selecting Endpoint Security Solutions
  • Live at: May 24 2011 6:00 pm
  • Presented by: Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
  • From:
Your email has been sent.
or close
You must be logged in to email this