Controlling network access and endpoints

As more enterprise computing users become mobile, the chances that one of these laptops will become infected when off your enterprise network becomes more likely. And while many corporate IT departments attempt to secure their laptops with anti-virus and personal firewall software, these defenses aren’t enough to keep up with the malicious software attacks that course through the Internet on an hourly basis.

So what can an IT manager do to protect their endpoint PCs? This white paper from the Trusted Computing Group (TCG) will review what options exist, show you what endpoint security does and doesn’t do, and how it fits into your existing network security solutions.

0 thoughts on “Controlling network access and endpoints

  1. Some more Endpoint security news: There’s a new Endpoint security freeware tool that was released recently by GFI software.

    The tool checks what devices are or have been connected to computers on a network and by whom. It’s basically a diagnostic tool that tells you where on your network the use of portable storage devices could pose a risk.

    The tool is called Endpointscan: Endpoint scan

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.