Key Considerations for Selecting Endpoint Security Solutions
Scheduled Time: Recorded on May 18, 2011
Duration: 59min 55sec
Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks. Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux. To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include: ? The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media ? Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources. ? High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.