In the past, endpoint security has focused on protecting endpoint devices, managing this by installing software on these devices. The traditional office, however, is changing, with increasing remote users, telecommuters and road warriors taking these devices on the road, into unknown wireless networks.
Now the focus on protection has shifted to protecting the network from both outside attackers and the vulnerability that insiders pose. Is your endpoint security focus shifting? How do you or how does your company manage endpoint security? What do you view as the highest threat to your network and how do you protect against that?
This question was inspired by an article at Tech News World.
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!