Back to Results
First PageMeta Content
Security / Malware / Vulnerability / Universal Serial Bus / Zero-day attack / Network security / BigFix / EXtensible Host Controller Interface / Computer network security / Cyberwarfare / Computer security


Endpoint Defense:
 Essential Practices Version 1.4
Add to Reading List

Document Date: 2015-03-30 09:30:11


Open Document

File Size: 529,36 KB

Share Result on Facebook

Company

META Group / Mike / Securosis L.L.C. / Microsoft / Creative Commons / /

/

IndustryTerm

minute more devices / patch management product / technology vendors / technology guidance / pragmatic advisory services / threat management / compromised device / prevention technology / software fixes / detection technology / software vendors / targeted applications / technology environment / fancy car / due diligence services / software market / configuration management / Device control technology / corporate network / ineffective legacy protection technologies / security analytics product / detection technologies / security management / Suspect software / compliance management / re-imaging devices / /

Organization

US Federal Reserve / /

Person

Chris Pepper / Mike / /

/

Position

Author / compliance driver / dentist / VP / Strategy / programmer and networking consultant / Analyst and President / /

Technology

ineffective legacy protection technologies / AV / PKI / detection technology / Device control technology / detection technologies / prevention technology / /

URL

www.securosis.com / http /

SocialTag