Top 5 Misconceptions about Endpoint Data Security

Webinar Registration

In the information security world – especially if you are technical - it’s so easy to get drug down into the weeds fretting about esoteric technical vulnerabilities. 

At the same time I sometimes see less technical security architects overly simplify things and put too much faith in certain controls because of their conceptual elegance while missing an important risk due to a subtle technical detail. 

Both traps are easy to fall into with endpoint data security.  For instance, Windows workstations are your most common endpoints so it makes good sense to look at Windows operating system security issues. 

However, even if you make Windows as hard as a rock, a host of ways remain for malware, incompetence and malicious agents to steal or leak data. 

In this real training for free webinar I will discuss 4 important misconceptions that I frequently observe with regard to endpoint data security:

  • Misconception #1: Protecting the Operating System is the Primary Goal
  • Misconception #2: Malware and Data Leakage Are 2 Different Problems
  • Misconception #3: Encryption is the Main Solution to Data Leakage
  • Misconception #4: Endpoint Security Requires Integration of Multiple Solutions

Update - Later in my research for this webinar, I isolated an additional misconception:

  • Misconception #5: All You Have to Worry About is Data on the Endpoint
These misconceptions can leave you open to big risks and waste time and money, but in this session I’ll show you how to avoid doing that.  After my training session, Sophos will briefly demonstrate how their endpoint security and data protection solution maps directly to the points in my training session.  Then we’ll take your questions.
 
Register now for this real training for free.
First Name:   
Last Name:   
Work Email:  
Phone:  
Job Title:  
Organization:  
Country:    
State:  
Zip/Postal Code:  
Industry:
Company Size:
 

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us.

 

 

Additional Resources