Endpoint Security: Protecting networks from mobile end-users

I continue to talk about this topic with a speech to the members of Washington University’s Center for Application of Information Technology on March 22nd and for the Association of IT Professionals on April 26th. I will examine current solutions and products that claim to provide endpoint security and their strengths and deficiencies. I will highlight the different components of solid endpoint security solutions, and outline the four questions that you need to have answered before you get ready to buy solutions for your enterprise. I will also look at the standards being developed by Microsoft, Cisco and open source, how they stack-up against each other, and what you can be doing now as these are being finalized.

Here is a link to a presentation on cracking NAC that was presented at Black Hat Europe last month.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.