• Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame

  • 2020/04/03
  • 再生時間: 15 分
  • ポッドキャスト

Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame

  • サマリー

  • With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?

    In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.

    Part 3 - How To Map Endpoint Security To A Contemporary Security Strategy?

    In the previous two episodes, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane. They discussed the history of endpoint security and how to progress moving forward.

    In this final part of the podcast, Ian explains various aspects of how to implement endpoint security most effectively. Furthermore, making sure these security controls are kept up to standard and improve over time.

    続きを読む 一部表示

あらすじ・解説

With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?

In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.

Part 3 - How To Map Endpoint Security To A Contemporary Security Strategy?

In the previous two episodes, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane. They discussed the history of endpoint security and how to progress moving forward.

In this final part of the podcast, Ian explains various aspects of how to implement endpoint security most effectively. Furthermore, making sure these security controls are kept up to standard and improve over time.

Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgameに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。