John Meakin: Effective Deployment Depends on Understanding Your Threat Scenarios
Rather than searching for the perfect endpoint solution, begin by carefully thinking through the most likely threat scenarios that apply to your endpoint estate. The best approaches for securing the endpoint broadly fit into architecture where there’s an agent on the...
Isabel Maria Gomez: Effective Implementation Depends on Effective Communication
One of the biggest challenges is getting alignment within the organization on the kind of solution that best serves everyone’s needs. The solution provider needs to understand that the security team is going to develop rules for selecting the data that’s needed, and...
Harshil Parikh: Making the Case for an Endpoint Security Solution
A real-world demonstration can be helpful in making the case for why an endpoint-security solution is necessary from a risk-management perspective. Highlighting risk factors that are specific to the business is another effective way of making the argument for an...
Wayne Peterson: To Prevent Attacks, Start with the Endpoints
Businesses today must first secure their endpoints in order to have the greatest chance of fending off attacks. Once you have an endpoint-security strategy in place, you can optimize it with automated processes and smart data insights. “Today your most critical...
Richard Davis: Make Sure the Solution Fits the Environment and the Need
When modifying any security practice, whether it’s changing emphasis or adopting new or stronger endpoint security tools, it’s important to maintain a holistic perspective. You need to know what kinds of data you have on your endpoints, how people use it, understand...
Chris Thompson: Adopting Endpoint Security Involves Both Business and Technical Considerations
It’s important that vendors prove themselves, to show their solution delivers the visibility and advanced detection and response you need, and it plays well on your endpoints. Do not look just at technical questions, but also spend time working on things like...
Catharina “Dd” Budiharto: In Selling Management on Security Needs, Scare Tactics Only Go So Far
Finding the right balance in any organization depends on assessing risk and then convincing executive management to fund what’s needed. To sell the need for a security solution, use actual metrics that show the effectiveness of something that’s been deployed. “We now...
Elliott Breukelman: A Good Endpoint Security Strategy Focuses on Data Usage
Deciding on endpoint security involves assessing risk based on the value of your business data, where it is located, and the amount of mobile access to that data. Endpoint security adds a new layer of protection that does not require a wholesale change in an existing...
David Merrill: Implementation Should Be Gradual and Collaborative
To know the type of endpoint strategy that’s best suited to your needs, you must understand how vulnerable your organization is to advanced or specifically targeted attacks. Cloud-based services may offer an effective solution to the difficult task of balancing...
Daniel Schatz: Keys to Maximizing the Value of Endpoint Security
A business considering moving to a cloud-based next-generation platform for endpoint security must first clearly understand the security risks it faces. Security professionals must also consider how their staff will use the insights provided by any endpoint-security...