Rethinking Endpoint Security

Logo
Presented by

John Pironti, President, IP Architects LLS. Carolyn Crandall, Chief Security Advocate, Attivo Networks.

About this talk

As more companies adapt their policies to accommodate the fact that many employees will continue to work from home, the IT security manager has to expand the concept of “endpoint security.” Does that include the employee’s personal printer and home wireless network? How much responsibility is your enterprise going to take for the security of personal devices? How do you protect their credentials for cloud-based applications and manage their identities so that attackers can’t weaponize those accounts against your organization? In this webinar, experts offer recommendations on how to build the endpoint security strategy that balances what end users may use to get their work done and what the enterprise is able to accommodate. You will receive tips on how to develop a consistent endpoint security strategy that works for all users and applications. You will walk away with a clearer idea of how your enterprise can tackle the endpoint security problem. Attend this webinar and you'll: - Discover new techniques, tips, and procedures for safeguarding remote users and their data. - Improve the security posture of your end-users, regardless of whether they're accessing the company network or the cloud. - Find smarter ways to lock down important endpoint assets like identity data and application access. - Recalibrate how granular you want your endpoint protection policies to be.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (34)
Subscribers (5350)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.