InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Rethinking Endpoint Security

Presented by

John Pironti, President, IP Architects LLS. Carolyn Crandall, Chief Security Advocate, Attivo Networks.

About this talk

As more companies adapt their policies to accommodate the fact that many employees will continue to work from home, the IT security manager has to expand the concept of “endpoint security.” Does that include the employee’s personal printer and home wireless network? How much responsibility is your enterprise going to take for the security of personal devices? How do you protect their credentials for cloud-based applications and manage their identities so that attackers can’t weaponize those accounts against your organization? In this webinar, experts offer recommendations on how to build the endpoint security strategy that balances what end users may use to get their work done and what the enterprise is able to accommodate. You will receive tips on how to develop a consistent endpoint security strategy that works for all users and applications. You will walk away with a clearer idea of how your enterprise can tackle the endpoint security problem. Attend this webinar and you'll: - Discover new techniques, tips, and procedures for safeguarding remote users and their data. - Improve the security posture of your end-users, regardless of whether they're accessing the company network or the cloud. - Find smarter ways to lock down important endpoint assets like identity data and application access. - Recalibrate how granular you want your endpoint protection policies to be.
Attivo Networks

Attivo Networks

5371 subscribers30 talks
Prevent Lateral Movement and Privilege Escalation
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.
Related topics