Taking back Endpoint Control!

SecTor 2015

Presented by: John Beal
Date: Tuesday October 20, 2015
Time: 11:30 - 12:00
Location: 701B
Track: Sponsors

When it comes to endpoint security, it has been said that the best way to keep an infected device from causing damage to the broader network is to keep it turned off once it is compromised. While this method of quarantining an endpoint may be a quick fix, for obvious reasons it is not very practical in the long run.

A better approach would be to keep endpoints from being infected in the first place. But in today’s world of sophisticated malware attacks, a prevention strategy is not enough on its own. You also need the ability to detect attacks as they happen and take remediation actions on noncompliant endpoints. Solid, holistic endpoint security strategies address the prevention, detection and remediation phases. Once in place, these measures should enable you to answer four critical questions about your endpoints. Are my endpoints vulnerable, protected, compliant and/or compromised?

Links

John Beal

John Beal is the National Security SaaS Leader for Canada. Previously he was the Sales Leader for Mobility and Endpoint Solutions across Canada and the Caribbean. He has 20 years of experience with IBM across both Hardware and Software.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats