Bob Tarzey, Analyst & Director, Quocirca
In IT the term end point is broad, covering everything from servers at a fixed location inside the firewall to smartphones that may move from one side of the globe to another in a matter of hours. End points can also be virtual and/or hosted by third parties makes things more complex still. There is no single answer to how end points should be secured, it depends on the type of device, the person (or people) using it and the nature of the transactions it is expected to be used for. This presentation will look at the different options for securing end points, from mobile malware protection to next generation firewalls, and discuss what is appropriate when and where.