This resource is no longer available
Endpoint Security Management Buyer's Guide
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance oversight and evolving security attacks against vulnerable endpoint devices, getting a handle on managing endpoint becomes more important every day. Complicating matters is the fact that ‘endpoints’ now include all sorts of devices – including a variety of PCs, mobiles, and even kiosks and other fixed function devices. This report, developed by analyst firm Securosis, is focused on helping you understand what features and functions are important – in the four critical areas of patch management, configuration management, device control, and file integrity monitoring.