Windows desktop endpoint security challenges podcast series

When planning for desktop virtualization and cloud computing, the endpoint security threats that come with the territory will start to surface. Don't let these security issues get in the way. Listen to part 1 of our expert podcast with Mark Kadrich, CISSP and the CEO and chief evangelist at The Security Consortium, and get a heads up on these Windows desktop endpoint security challenges.

Windows desktop endpoint security challenges: Part 1

Duration: 5:35

0:30 An overview of the threats to Windows desktops and other endpoints around 2009.

1:40 How the responsibilities have shifted for IT managers regarding the security of endpoints.

2:30 How admins are coping with the large number of endpoint devices that have been introduced into the enterprise over the past few years.

As IT managers plan their desktop virtualization or cloud computing environments, it may alter their endpoint security strategy. In part 2 of our Windows desktop endpoint security challenges podcast series, expert Mark Kadrich, CISSP and the CEO and chief evangelist at The Security Consortium, talks about changes and updates to Windows security models and strategies and new Windows features that he's seeing in enterprises today.

Windows desktop security features and strategy changes: Part 2

Duration: 8:45

0:45 Talks about Microsoft's Network Access Protection feature and its impact on endpoint security and client use.

2:28 How Windows 7 features change the endpoint security picture.

4:26 How endpoint security strategies will change if enterprises move to a virtual desktop model.

6:34 Explanation on why administrators are split on how virtualization affects their security models.

Cloud computing is coming, and so are the many security issues that come with it. Educate yourself now. In the final piece of our Windows desktop endpoint security challenges podcast series, expert Mark Kadrich shares his thoughts on endpoint security risks in cloud computing environments and endpoint security tools that should be on your radar.

Endpoint security risks in a cloud computing environment: Part 3

Duration: 8:15

0:50 Talks about potential endpoint security risks in a cloud computing environment.

2:35 A follow up to the first question -- with a focus on internal cloud services.

4:16 Explains the guidelines that he gives IT shops in terms of planning for endpoint security in a cloud computing environment.

5:43 Lays out new endpoint security tools that should be on your radar.

More on endpoint security:

  Security tools that can boost Windows mobile security
Security tools that improve Windows Mobile security can be hard to find. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.

  How to strike a balance between Windows security and business needs
Learn strategies for balancing Windows security with your organization's and users' needs.

  Windows mobile security: Get it locked down
Windows mobile security is a very real concern that cannot be ignored. Learn about the risks of mobile device security and some organizational must-haves in this tip.

Mark Kadrich
Mark Kadrich is a CISSP and the CEO and Chief Evangelist at The Security Consortium. For the past 20 years, he has worked in the security community, building knowledge, and contributing solutions. He is a contributing author in publications such as TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, and The Black Hat Briefings. His own book End Point Security was published in 2007. Mark is also a well-known speaker and evangelist on network security matters at technical conferences and events.

This was first published in March 2009

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: