Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Complicating matters is the fact that ‘endpoints’ now include all sorts of devices – including a variety of PCs, mobiles, and even kiosks and other fixed function devices. Listen to Mike dive into the four critical areas that are most important for 2013 endpoint security management planning. Understand what features and functions are important – in the four critical areas of patch management, configuration management, device control, and file integrity monitoring.