Key Considerations for Selecting Endpoint Security Solutions

Presented by

Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET

About this talk

Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks. Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux. To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include: • The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media • Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources. • High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.

Related topics:

About this channel

GalaxyTech International
Upcoming talks (0)
On-demand talks (6)
Subscribers (208)
Security is hard. Working with a security VAR doesn't have to be. At GalaxyTech International we focus on making your life easier. Simplified product offerings, professional services you can afford, and an attitude of service are how we do it. We want you so happy with our service, that you could never imagine working with anyone else!