Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

8 Important Features You Need In An Endpoint Security Tool

From having the ability to remove agents and detect malicious scripting to probing the behavior of machines rather than signature models, here are eight things companies need in an endpoint security tool.

Back 1 ... 4   5   6   7   8   ... 9 Next
photo

Ability To Vary Access Level By Application

Old-school VPN approaches connect users to the enterprise network and assume that all points are network-based, according to Nico Fischbach, global chief technology officer at Forcepoint. As a result, Fischbach said companies using VPN either must open up their entire network and assume all the risk that comes with that or restrict the network to applications that are being run on-premises.

VPN takes a point-to-point approach to security, Fischbach said, connecting users to the network. Conversely, Fischbach said a Zero Trust Network Access (ZTNA) approach allows for a more continuous policy where companies can provide remote access only to very specific applications and restrict access in real time if an application’s behavior is deemed to be risky.

ZTNA is much more application- and risk-driven since it doesn’t matter whether an application resides at corporate headquarters, in a data center or in a Software-as-a-Service environment, Fischbach said. The best way organizations can hide the complexity of remote access application is by using ZTNA, according to Fischbach.

 
 
Back 1 ... 4   5   6   7   8   ... 9 Next

sponsored resources