Video: Securing the Modern Endpoint Perimeter Webinar

In this webinar, InfoTrust presented how the endpoint perimeter has evolved, what this has meant for the threat landscape and how cybercriminals are exploiting these digital transformations. We also evaluated good security practices all organisations should be undertaking and the importance of defence in breadth.

Agenda

Securing your perimeter 
• What is the perimeter?
• Endpoint: the lowest common denominator
• Securing the interactions your staff have with your network

Good Security Practices (above & beyond AV) 
• IT Hygiene
• Threat Intelligence
• Vulnerability Management
• Endpoint Management

Endpoint Protection Platforms 
• Getting the most out of each of your products
• Defence in breadth

To access the recording today complete the form.

see our

Related resources