Posted on
in Presentations
Shifts in usage patterns, security architectures and threat profiles are key ingredients in the ongoing evolution of endpoint security offerings. This session will review main technical requirements and techniques that modern c offerings have. Based on 451 Research’s work understanding market trends, the session will also review trends and vendor groupings.
Learning Objectives:
1: Recognize major groupings of endpoint vendors based on functionality/approach.
2: Understand the different analytic approaches used in each phase of lifecycle.
3: Understand the current and expected trends around endpoint security offerings.
Learning Objectives:
1: Recognize major groupings of endpoint vendors based on functionality/approach.
2: Understand the different analytic approaches used in each phase of lifecycle.
3: Understand the current and expected trends around endpoint security offerings.
endpoint security mobile security operational technology (OT Security) anti-malware
Subtopic
endpoint security
mobile security
operational technology (OT Security)
anti-malware
Share With Your Community