Keys to Maximizing the Value of Endpoint Security
- A business considering moving to a cloud-based next-generation platform for endpoint security must first clearly understand the security risks it faces.
- Security professionals must also consider how their staff will use the insights provided by any endpoint-security solution they select.
“It really falls upon the security professional to understand the business, and then understand the front landscape around it.”
At the UK-based digital sports content and media group Perform, Daniel Schatz is responsible for a dynamic environment in which most employees are mobile, working from outside the office in various locations including the sports games that Perform Group covers. Most of Schatz’s endpoints are Windows-based (about 60 percent Windows and 40 percent MacOS), with a few Linux devices mixed in. To secure these diverse endpoints, he has been evaluating new endpoint-security strategies, including cloud-based solutions that offer real-time threat monitoring and detection at the endpoint.