Is traditional endpoint security dead?

There are several themes that will be prevalent among many of the sessions in this Spring’s Infosecurity Global Virtual Conference, and none are more important than the convergence of “de-parameterization” and “consumerization” within enterprise IT. With this in mind, Infosecurity has brought together three panelists to discuss the state of endpoint security and whether the idea of it, as traditionally practiced, has been declared obsolete.
 
Representatvies from Credant Technologies, Lumension, and the Jericho Forum will spend an hour articulating what they feel is the proper approach to endpoint security in an attempt to answer the question of whether traditional endpoint security defenses are no longer applicable to today’s computing environment.
 
Paul Zimski of Lumension will provide an overview of endpoint attack methodologies, while advocating for a multi-layered approach that still requires technological controls. Chris Burchett of Credant Technologies will tout a more-data centric approach to security, above and beyond endpoint controls. While Paul Simmonds of the Jericho Forum has promised to declare endpoint controls dead in today’s IT landscape, favoring instead a risk-based approach.
 
So, is the traditional approach to endpoint security dead, using a device-centric approach? Reports of this death may be exaggerated; perhaps “reincarnated” is an a more appropriate suggestion. Opinions are sure to differ on the topic, so if this type of lively debate piques your interest, be sure to register for the Spring 2011 Global Virtual Conference as soon as possible.
 

What’s hot on Infosecurity Magazine?