Wednesday, March 1, 2017

Endpoint security controls: Fact vs. fiction

David,

Fact or fiction? Application whitelisting is problem-free for end users.

Well, that’s fiction.

Mike Rothman, president and analyst of Securosis, explains why in the podcast, Fact or Fiction as he points out which endpoint controls are truly effective and reveals how they impact security and productivity.

Plus, learn how to use the good ones to the fullest potential and how to move beyond the ones that might be a waste of time and money.

In addition to this podcast, access our Endpoint Security Resource Center for insight into 4 more resources to help you get the most out of your existing endpoint controls.

Go Now

Rothman teamed up with IT security veteran Michael Cobb to help you design a stronger endpoint security program -- don't miss out!

-- Katie Graybeal

 


This premium content is made available by the support of our sponsors.



 







ABOUT THIS EMAIL

TechTarget publishes media for information technology professionals. More than 140 focused Web sites enable quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice. At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts.

To unsubscribe from all Security Media Group lists, go to unsubscribe.

Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shares with the sponsors of that content as described in our Privacy Policy.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

TechTarget
275 Grove Street
Newton, MA 02466

No comments: