Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > Lumension > Everything Matters: Every Setting, Every Component, Every Technology

Everything Matters: Every Setting, Every Component, Every Technology

Webinar Published By: Lumension
Published:  Jan 22, 2013
Type:  Webinar

You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.

Today most Security Professions “get it” that endpoints are just as important as servers. But there are so many of them and there are so many more threat vectors on endpoints than on servers. How do we manage them all? For example, Flame has shown that Attackers only needed to infect a single system belonging to a low-level user and they had a chance to infect other, so-called “high-value” systems assigned to users with access to the information they wanted. So you can’t just protect your important systems because, well, they’re all important.

Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control