Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > ESET > Key Considerations for Selecting Endpoint Security Solutions
 

Key Considerations for Selecting Endpoint Security Solutions

Webinar Published By: ESET
ESET
Published:  Jul 28, 2011
Type:  Webinar

Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.

Topics covered include:

  • How to protect a wide range of devices which work in virtualized environments, and deal with removable media
  • Resource benefits to centralize management with remote administration tools that verify protection
  • Importance of performance and protection with minimal impact on machine performance
As part of our Cybersecurity Masters webinar series, ESET is providing a recorded version of expert presentation by guest speaker Charles Kolodgy, Research Vice President of Security Products at IDC.



Tags : 
webcast, key consideration, eset, endpoint security, security, endpoint