Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

In its benchmark study on endpoint security, Endpoint Management: The Cost Cutter's Case for Convergence (March, 2009), Aberdeen looked at the current and planned use of several enabling technologies for endpoint security and endpoint management. From the perspective of profiling the current level of adoption of these technologies by Best-in-Class organizations, "baselines" technologies for endpoint security include:
  • Anti-virus, anti-spyware
  • Intrusion detection / prevention
  • Personal firewalls
  • Patch management, configuration and change management
Virtually all companies have deployed technologies for anti-virus, anti-spyware, intrusion detection/ prevention, personal firewalls and patch management, and a majority have implemented configuration and change management. In broad terms, the findings in the Endpoint Security, Endpoint Management study make it clear that leading organizations have given first priority to the platform and network perspectives of protecting and managing their endpoints. Building on this foundation, they are currently focusing on protecting and managing their applications. (e.g. using application virtualization, application whitelisting, software distribution, and inventory management). Looking forward, they are beginning to increase the focus on protecting and managing their data. (e.g. using data loss prevention and online backup and recovery).
Shavlik Technologies
20 Jul 2009
20 May 2009
11 Page(s)
Analyst News
Already a Bitpipe member? Login here

Download this Analyst News!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor