Looking for something else?
0:30 An overview of the threats to Windows desktops and other endpoints around 2009.
1:40 How the responsibilities have shifted for IT managers regarding the security of endpoints.
2:30 How admins are coping with the large number of endpoint devices that have been introduced into the enterprise over the past few years.
As IT managers plan their desktop virtualization or cloud computing environments, it may alter their endpoint security strategy. In part 2 of our Windows desktop endpoint security challenges podcast series, expert Mark Kadrich, CISSP and the CEO and chief evangelist at The Security Consortium, talks about changes and updates to Windows security models and strategies and new Windows features that he's seeing in enterprises today.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
0:45 Talks about Microsoft's Network Access Protection feature and its impact on endpoint security and client use.
2:28 How Windows 7 features change the endpoint security picture.
4:26 How endpoint security strategies will change if enterprises move to a virtual desktop model.
6:34 Explanation on why administrators are split on how virtualization affects their security models.
Cloud computing is coming, and so are the many security issues that come with it. Educate yourself now. In the final piece of our Windows desktop endpoint security challenges podcast series, expert Mark Kadrich shares his thoughts on endpoint security risks in cloud computing environments and endpoint security tools that should be on your radar.
0:50 Talks about potential endpoint security risks in a cloud computing environment.
2:35 A follow up to the first question -- with a focus on internal cloud services.
4:16 Explains the guidelines that he gives IT shops in terms of planning for endpoint security in a cloud computing environment.
5:43 Lays out new endpoint security tools that should be on your radar.
More on endpoint security:
Security tools that can boost Windows mobile security
Security tools that improve Windows Mobile security can be hard to find. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.
How to strike a balance between Windows security and business needs
Learn strategies for balancing Windows security with your organization's and users' needs.
Windows mobile security: Get it locked down
Windows mobile security is a very real concern that cannot be ignored. Learn about the risks of mobile device security and some organizational must-haves in this tip.
|ABOUT THE AUTHOR:|
| Mark Kadrich
Mark Kadrich is a CISSP and the CEO and Chief Evangelist at The Security Consortium. For the past 20 years, he has worked in the security community, building knowledge, and contributing solutions. He is a contributing author in publications such as TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, and The Black Hat Briefings. His own book End Point Security was published in 2007. Mark is also a well-known speaker and evangelist on network security matters at technical conferences and events.