This resource is no longer available

Top Tactics for Endpoint Security

Cover

The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured.

This webcast will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Attendees will learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network-access control technologies in an organization's identity management program and tips for deploying an endpoint architecture that will cover all access paths.

Speaker

Ben Rothke Security Consultant, BT INS
Vendor:
CREDANT Technologies
Premiered:
Jul 17, 2006, 09:00 EDT (13:00 GMT)
Format:
Multimedia
Type:
Webcast
Language:
English

This resource is no longer available.