InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Taking Control: Securing Unmanaged Endpoints with CrowdStrike and Talon

Presented by

Dave Gruber, ESG | Justin Kapahi, Talon | Josh Lang, CrowdStrike

About this talk

Organizations like yours rely on third parties more than ever. These third parties often work from unmanaged endpoints, which introduces remarkable cyber-risk to your enterprise. Everyday, new reports surface about companies suffering data leaks, ransomware attacks, and malware intrusions due to a lack of security and visibility on unmanaged endpoints – offering you an opportunity to learn from their experiences and enhance your own protections. But what if you could include these devices into your security stack and greatly reduce the risk of a devastating attack? Join this panel discussion featuring endpoint experts from CrowdStrike, Talon and TechTarget’s Enterprise Strategy Group as they explore how enterprise browsers and integrated security solutions defend unmanaged endpoints against malware, block access to risky websites, and prevent confidential data leakage. This talk will cover: • Why traditional endpoint security is no longer enough • Use cases for enterprise browsers, including unmanaged personal devices & unmanaged 3rd-party devices • CrowdStrike and Talon’s integrated solution for securing unmanaged endpoints
CrowdStrike

CrowdStrike

36108 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics