Choosing the right endpoint security product can be tricky, as the best fit depends on your customer's wants and needs. This two-part Channel Expert Podcast is geared toward educating solution providers on the variety and selection of endpoint security products available. In the first podcast, Andrew Plato, president and principal consultant of Anitian Enterprise Security, reviews the current endpoint security offerings and some endpoint security product deployment best practices. In the second podcast, Plato tackles the subject of endpoint security product management.
Part 1: Selecting and deploying endpoint security products
Endpoint device security is needed to protect users against threats that commonly slip through network-level security. It's important to deploy the appropriate tools at each endpoint. In this podcast, Plato highlights the primary considerations of endpoint security product selection and offer guidelines for deployment.
Part 1 of the Channel Expert Podcast: Listen to Andrew Plato discuss how to select an endpoint security product and offer tips for deployment.
Part 2: Balancing security and usability at the endpoints
Endpoint security must be managed on each device. Regardless of whether endpoints are managed individually or through central management features, each endpoint must strike a balance between security and usability. In the second podcast, Plato examines endpoint security management issues and helps solution providers configure client endpoints to be secure while remaining convenient to use.
Part 2 of the Channel Expert Podcast: Listen to Andrew Plato as he examines endpoint security management and configuration.
About the expert
Andrew Plato, CISSP, CISM and QSA, is president and principal consultant at Anitian Enterprise Security. Andrew has over 15 years of experience in information systems, networking and computer security. Prior to working for Anitian, he was a database developer and technical writer for Microsoft. In 1997, he helped start up Network ICE Corp., which marketed the first protocol analysis-based intrusion prevention system.
This was first published in November 2008