InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Developing and Managing an Endpoint Security Strategy for Your Enterprise

Presented by

Stacey Halota, Nadav Maman, Sara Peters

About this talk

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications Attend this webinar and you'll: Reassess how to define "endpoint" Identify strategies for defending those devices that cannot be secured with traditional endpoint protection tools Learn what security measures are most effective against ransomware and other leading threats to your endpoints Get tips for patching, monitoring and managing remote workers' devices
Deep Instinct

Deep Instinct

4920 subscribers53 talks
Fight AI with the best AI.
Deep Instinct, the first and only preemptive data security company built on a deep learning cybersecurity framework, prevents unknown threats in <20 milliseconds, 750X faster than the fastest ransomware can encrypt. Deep Instinct Data Security X (DSX) secures data at-rest or in-motion – across cloud, NAS, applications, and endpoints.
Related topics