Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Create a System of Systems to Protect Endpoints

“I think the industry is finally waking up to the idea that endpoint security and network security are not two separate things,” said Rick Howard (@racebannon99), CSO of Palo Alto Networks, in our conversation at the 2015 Black Hat Conference in Las Vegas.

What’s happening, said Howard, is that your endpoints are now actually talking to your systems, such as your IPS, creating a correlated system of systems.

Instead of panicking about an unknown device with no security controls on it, said Howard, have a system of systems that protects you at multiple layers up to the endpoint. Such a layered environment would require the bad guys to have to jump through many hoops just to get to the endpoint.

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.