sponsored by Shavlik Technologies
Posted:  20 Jul 2009
Published:  20 May 2009
Format:  PDF
Length:  11  Page(s)
Type:  Analyst News
Language:  English
ABSTRACT:
In its benchmark study on endpoint security, Endpoint Management: The Cost Cutter's Case for Convergence (March, 2009), Aberdeen looked at the current and planned use of several enabling technologies for endpoint security and endpoint management. From the perspective of profiling the current level of adoption of these technologies by Best-in-Class organizations, "baselines" technologies for endpoint security include:
  • Anti-virus, anti-spyware
  • Intrusion detection / prevention
  • Personal firewalls
  • Patch management, configuration and change management
Virtually all companies have deployed technologies for anti-virus, anti-spyware, intrusion detection/ prevention, personal firewalls and patch management, and a majority have implemented configuration and change management. In broad terms, the findings in the Endpoint Security, Endpoint Management study make it clear that leading organizations have given first priority to the platform and network perspectives of protecting and managing their endpoints. Building on this foundation, they are currently focusing on protecting and managing their applications. (e.g. using application virtualization, application whitelisting, software distribution, and inventory management). Looking forward, they are beginning to increase the focus on protecting and managing their data. (e.g. using data loss prevention and online backup and recovery).





BROWSE RELATED RESOURCES
Access Control | Data Security | Endpoint Security | Integrated Threat Management | Malware | Network Security | Remote Access Security | Security | Security Management

View All Resources sponsored by Shavlik Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement