ComputerWeekly.com Research Library

Powered by Bitpipe.com

ABSTRACT:

Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.

Complicating matters is the fact that ‘endpoints’ now include all sorts of devices – including a variety of PCs, mobiles, and even kiosks and other fixed function devices. Listen to Mike dive into the four critical areas that are most important for 2013 endpoint security management planning. Understand what features and functions are important – in the four critical areas of patch management, configuration management, device control, and file integrity monitoring.

(THIS RESOURCE IS NO LONGER AVAILABLE.)

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.