Protecting the ever-expanding endpoint

Share this article:

Register today


Date:
Monday, September 23, 2013
Time: 2 p.m. ET/
11 a.m. PT

Today's enterprise networks are far-reaching with innumerable devices accessing assets. The challenge for security practitioners is gaining a clear idea of who's using what, knowing how many devices are touching their network, and then making sure operations run smoothly – while proprietary information stays where it belongs.

This 20/20 Webcast from SC Magazine will examine the need for endpoint security that can allow systems to function, yet offer robust protections from all manner of cyber attack – and, as well, enables compliance requirements to be met.

Featured Speakers:

Dan Wolff, Enterprise Product Marketing, McAfee
Dan Wolff is on the McAfee Endpoint Security Product team responsible for core Endpoint Security products including VirusScan Enterprise, Deep Defender, HIPS, Firewall and Host Web Filtering. He is a recognized security expert with over 12 years of security engineering, marketing and management experience.

Illena Armstrong, VP, editorial, SC Magazine
Illena Armstrong is VP editorial of SC Magazine. She is responsible for overseeing the award-winning monthly publication and its many other editorial offerings, including scmagazine.com, the SC Magazine Canada monthly digital editions, numerous eConferences, webcasts, newsletters and physical events in the United States and Canada, and more. She has spoken and moderated at a number of industry events, including SC World Congress, SC Congress Canada, SC Magazine Roundtables, the RSA Conference, the Techno Security Conference and others. On her watch, SC Magazine has won more than 20 awards, including Magazine of the Year 2009, from the American Society of Business Publication Editors (ASBPE). Before her stint at SC Magazine, she worked for various newspapers and magazines in New England and the southern United States. She has a Bachelor of Arts in Communications and Photography from the University of North Florida and a Master of Education from Northeastern University.

Sponsored by:
McAfee

McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the world's largest dedicated security technology company. McAfee provides system, network, and mobile security solutions that allow users to safely connect to the Internet, browse, and shop online. Backed by global threat intelligence, our innovative products empower home users and organizations by enabling them to prove compliance, protect data, prevent disruptions, identify vulnerabilities, and monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe.

Share this article:
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.

Fighting APTs

Fighting APTs

With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate ...