Key Considerations for Selecting Endpoint Security Solutions

Presented by

Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET

About this talk

Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks. Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux. To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include: • The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media • Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources. • High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (132)
Subscribers (14084)
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>