Key Considerations for Selecting Endpoint Security Solutions
Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
About this talk
Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.
Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.
To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:
• The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
• Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
• High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.
Threats are evolving by the second. It's no longer just about viruses. Spyware, trojans, worms, rootkits, bots and phishing attacks are all on the rise. Malware writers are constantly reworking their code to evade security defenses.
The ESET Channel features resources to understand the nature of these evolving threats, their impact on your business, and why proactive protection is so important.…