Security

Endpoint Security: Compliance at the Endpoint Is "Out of Sight, Out of Mind" a Risky Security Strategy?

Watch Now Registration not required

Executive Summary

Endpoint Compliance is a tricky process. While gateways are a cost effective solution, they don't see all the traffic, especially from mobile users. For increasingly diverse users and their devices, endpoint security struggles to address state, federal, international, and industry regulations, internal policies (acceptable use and intellectual property protection), malicious code protection, data leakage, and unauthorized applications execution. Endpoint security solutions need to balance client resource consumption, administrative overhead, new client technologies, and changing compliance regulations.

  • Format: Webcast
  • Size: 37.91 KB