Daniel Schatz, CISO, Perform Group

Keys to Maximizing the Value of Endpoint Security

  • A business considering moving to a cloud-based next-generation platform for endpoint security must first clearly understand the security risks it faces.
  • Security professionals must also consider how their staff will use the insights provided by any endpoint-security solution they select.

“It really falls upon the security professional to understand the business, and then understand the front landscape around it.”

At the UK-based digital sports content and media group Perform, Daniel Schatz is responsible for a dynamic environment in which most employees are mobile, working from outside the office in various locations including the sports games that Perform Group covers. Most of Schatz’s endpoints are Windows-based (about 60 percent Windows and 40 percent MacOS), with a few Linux devices mixed in. To secure these diverse endpoints, he has been evaluating new endpoint-security strategies, including cloud-based solutions that offer real-time threat monitoring and detection at the endpoint.

This is an excerpt from 32 Security Experts on Changing Endpoint Security. The eBook was generously sponsored by Carbon Black.

Carbon Black