Endpoint Security eSummit

Capture
This makes everything connected to your network a jungle of endpoints, each one presenting its own security risks to the enterprise

Speakers

45342169_10212881801900130_5044401014266920960_o
Chris Trufan
Software Architect
david_balcar_headshotcb_002_1960868_1570467234071
David Balcar
Security Strategist
0
Jennifer Marcus
Director
0
Dominic Vogel
Dominic Vogel Founder & Chief Strategist, Board Director, Speaker, Comedian, Mentor
0
Bob Bentley
Senior Product Marketing Manager
0
Ryan Leatherbury
Product Manager
0 (1)
Kris Wayman
Channel Sales Engineer
0 (1)
Roger Grimess
Data-Driven Defense Evangelist

Start

November 21, 2019

End

December 31, 2019

Address

Online Event   View map

Our enterprise is comprised of a multitude of endpoints, both local and remote. These include servers, desktops, laptops, mobile devices and more. This makes everything connected to your network a jungle of endpoints, each one presenting its own security risks to the enterprise. You need tools that prevent unknown threats, work across your applications, process threat intelligence properly, improve security awareness and lastly, do not impede productivity.

Join us for the Endpoint Security eSummit on November 21 and discover how the experts approach endpoint security.

 

In this webinar, you will learn:

  • How the Device Health application extends access control for corporate applications based on device security hygiene
  • How the combination of user and device trust builds a strong foundation for a zero-trust security model
  • How to extend device visibility for corporate-owned, BYO and 3rd party managed devices
  • How to help end users proactively keep their devices updated and healthy

As more resources extend beyond the protections of the traditional perimeter, managing endpoint security becomes even more crucial: 33% of companies surveyed in Verizon’s 2019 Mobile Security Index said they had experienced a device-based compromise, and the majority reported the impact was major. Duo has provided our customers endpoint visibility and granular access control, enforcing policy at the point of access and checking the “security hygiene” of a device each time it connects. With our new Device Health application, we are now able to extend these capabilities further, reducing the risk of security breaches (ransomware, malware, data loss, etc.) due to unsafe and vulnerable laptop/desktop devices. Join Ryan Leatherbury and Bob Bentley from Duo’s Product team on November 21 for an introduction and walkthrough of Duo’s new Device Health functionality and how you can use it to mature your zero-trust access strategy.