Richard Davis: Make Sure the Solution Fits the Environment and the Need
When modifying any security practice, whether it’s changing emphasis or adopting new or stronger endpoint security tools, it’s important to maintain a holistic perspective. You need to know what kinds of data you have on your endpoints, how people use it, understand...
Chris Thompson: Adopting Endpoint Security Involves Both Business and Technical Considerations
It’s important that vendors prove themselves, to show their solution delivers the visibility and advanced detection and response you need, and it plays well on your endpoints. Do not look just at technical questions, but also spend time working on things like...
Catharina “Dd” Budiharto: In Selling Management on Security Needs, Scare Tactics Only Go So Far
Finding the right balance in any organization depends on assessing risk and then convincing executive management to fund what’s needed. To sell the need for a security solution, use actual metrics that show the effectiveness of something that’s been deployed. “We now...
Elliott Breukelman: A Good Endpoint Security Strategy Focuses on Data Usage
Deciding on endpoint security involves assessing risk based on the value of your business data, where it is located, and the amount of mobile access to that data. Endpoint security adds a new layer of protection that does not require a wholesale change in an existing...
David Merrill: Implementation Should Be Gradual and Collaborative
To know the type of endpoint strategy that’s best suited to your needs, you must understand how vulnerable your organization is to advanced or specifically targeted attacks. Cloud-based services may offer an effective solution to the difficult task of balancing...
Daniel Schatz: Keys to Maximizing the Value of Endpoint Security
A business considering moving to a cloud-based next-generation platform for endpoint security must first clearly understand the security risks it faces. Security professionals must also consider how their staff will use the insights provided by any endpoint-security...
Dan Bowden: Automated Forensics Boost a Security Team’s Effectiveness
Security professionals can answer tougher, more complex security questions in less time using next-generation endpoint security tools based in the cloud. When colleagues understand the need for security, they are more likely to want to do their part to protect the...
Brian Timmeny: Endpoints Must Be Protected at Several Levels
It’s important to protect not just an endpoint but also the surrounding environment that protects that endpoint. Effectively using AI and machine learning will be key to keeping up with the increasing volume and complexity of attacks. “Whenever someone tries to access...
Brent Maher: Endpoint Security Decisions Require a Strategic Approach
Mature security organizations refer to a security framework or maturity model when deciding whether to adjust their endpoint-security strategy. It’s important to be certain that the endpoint-security solution you purchase can actually solve the problems you have...
Alina Sarvey: Data Shows the Need for Better Endpoint Security
How a business views security’s importance can often play a role in the decisions made about improving endpoint security. Baseline security reports can help security professionals and the business decide whether there is a need for increased endpoint security. “The...