End point security - problems and solutions in 60 minutes

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The rapid proliferation of mobile devices, from smartphones to netbooks, is creating a growing security headache for IT managers in companies of all sizes.

Join us for this 60-minute run-down on how the latest technologies can make it simple for IT administrators to configure and deploy a complete security solution that works.

Along the way you'll get an appraisal of the problems IT managers face with end point security, as well as a roundup of the solutions those same managers can use from modern technology.

This webinar will:

  • Help you understand the need to isolate the endpoint from web and browser based threats.
  • Educate you on the latest risks from malware attacks to data loss/theft.
  • Assist you in making a choice of what technologies you need to protect your organisation's mobile IT resources and data.

This webinar is for:

  • IT managers in the MIS, IS and desktop spaces
  • CSOs and directors wanting to know more on this key topic
  • IT professionals looking to further their knowledge of security

Speakers

Steve Gold

Infosecurity Magazine

Daniel Horn

Senior Security Engineer, Check Point Software Technologies

Andrew Yeomans

Member of Board of Management, The Jericho Work Group

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.