Endpoint Security Fundamentals Subject of Lumension 3-Part Webcast Series

Share Article

Lumension hosts 3-part webcast series to discuss the steps to ensure healthy endpoints. IT security experts examine how to build a sustainable endpoint security program that does not impede business productivity.

Endpoint Security Fundamentals - A Three-part Webcast Series

In today’s mobile, nonstop business environment, information is drifting further away from the corporate boundaries and towards the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels: financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but simultaneously creates a dilemma for security professionals to determine the best way to protect it.

Lumension, the global leader in endpoint management and security, will host a three-part webcast series entitled Endpoint Security Fundamentals to examine how to build a real-world, defense-in-depth security program – one that is sustainable and one that does not impede business productivity. Experts who will lead the discussions are Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension.

Part one will focus on Finding and Fixing the Leaky Buckets, including:

The fundamental steps to take before implementing security enforcement solutions
How to effectively prioritize IT risks to focus on what matters most
How to act on the information gathered through assessment and prioritization efforts
How to get some “quick wins” and effectively communicate security challenges to senior management

Part two will focus on Leveraging the Right Enforcement Controls, including:

How to automate the update and patch management process across applications and operating systems to ensure all software is current
How to define and enforce standardized and secure endpoint configurations
How to effectively layer your defense and the evolving role that application whitelisting plays
How to implement USB device control and encryption technologies to protect data

Part 3 will focus on Building the Endpoint Security Program, including:

How to manage expectations and define success
How to effectively train users on policies and ensure two-way communication to evolve policies as needed
How to effectively respond to incidents when they occur to minimize potential damage
How to document and report on overall security and IT risk posture

Event Details:

WHAT: Endpoint Security Fundamentals


Part 1: Finding and Fixing the Leaky Buckets

  •     September 8, 2010 8am (PT); 11am (ET)

Part 2: Leveraging the Right Enforcement Controls

  •     September 22, 2010 8am (PT); 11am (ET)

Part 3: Building the Endpoint Security Program

  •     October 6, 2010 8am (PT); 11am (ET)

WHO: Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension

Registration Information:

To register for any or all of these webinars, please visit: Endpoint Security Fundamentals.

Supporting Resources:

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes vulnerability management, endpoint protection, data protection, antivirus and reporting and compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia, and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at lumension.com.

Lumension, the Lumension logo, and the tagline “IT Secured. Success Optimized.” are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kim Doyle
(480) 444-1229
Email >

Jessica Sutera
Visit website