Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > ESET > Key Considerations for Selecting Endpoint Security Solutions
 

Key Considerations for Selecting Endpoint Security Solutions

Webinar Published By: ESET
ESET
Published:  Jun 20, 2011
Type:  Webinar

Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.

Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.

To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:

• The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
• Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
• High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection. 

Presenter:
Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET  

Duration:
59 min



Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows