Easy prey: The danger of vulnerable endpoints and devices

Discussion Topics

Respondents from our audience are focusing their endpoint security efforts on the idea that end users can’t be trusted to keep the bad guys out. Multifactor authentication and strong password enforcement top the list of resulting controls, requiring users to submit extra proof that they are who they say they are to weed out imposters; explore detailed findings in our report.

Easy prey: The danger of vulnerable endpoints and devices

Sponsors

CRA | Business Intelligence
0%