Endpoint Protection

Learn to use practical reasoning and techniques to maximize the effectiveness of security resources to protect an organization's devices.

Types of endpoints

The days of a heterogeneous environment are gone. Endpoints come in a variety of shapes and sizes, including:

  • Servers

  • Desktops

  • Laptops

  • Mobile phones

  • Tablets

Operating systems

Just as an endpoint’s form factor can vary greatly, so can the operating systems running on those devices, which include:

  • MacOS

  • Android

  • Chrome OS

  • Apple iOS

  • Windows Mobile OS

  • Various distributions of Linux

Add the explosive growth of cloud computing and the Internet of Things (IoT), and the final result is controlled chaos. Yet all of this somehow has to work together and facilitate productivity securely.

...