Securing End User Identities
Episode 4 of the Dark Reading Cybersecurity Crash Course
Not so long ago, the notion of “endpoint security” focused on the management of desktop devices. But today’s end user employs a wide variety of devices in a wide variety of locations – many of which don’t belong to your organization. How can enterprises build a security strategy that identifies the end user and applies the appropriate security – no matter what their location or device? This session provides new insights on securing your end users.