Endpoint Management and Protection Tools

About This EcoCast

Endpoints are a significant point of entry into corporate computing environments. Whether those endpoints are desktops, laptops, tablets, terminals, smartphones, printers, or other devices, they are among the easiest places for attackers to gain access.

When attackers do break in, it's bad in several ways. Productivity suffers when the devices are bricked by an attack or locked down for a security emergency. Data can be compromised from endpoints that can then pose a competitive, financial, or compliance risk. Finally, the endpoints can serve as a jumping off point for the attacker into the rest of the organization's assets. Of course, security isn't the only issue. The proliferation of devices means effective tools for management of endpoints can save the IT department time, money, and effort.

Attend this EcoCast to hear about innovative solutions that can dramatically improve your endpoint management and protection.

Why You Should Join:

  1. Pick up best practices for getting your endpoints under control
  2. Learn about the latest attack techniques targeting endpoints, and how to defeat the bad actors
  3. Discover innovative tools for managing and protecting endpoints
  4. Get your questions answered by expert presenters!


  1. Matt Hickey

    Matt Hickey Senior Director, Sales Engineering

  2. Dmitriy Kumets

    Dmitriy Kumets Principal Product Manager

  3. To Be Announced

    To Be Announced To Be Announced

  4. Andrey Pozhogin

    Andrey Pozhogin Senior Product Marketing Manager – Endpoint


All times shown are Eastern Time.

  1. Sophos
  2. Huntress Labs
  1. Rubrik
  2. CyberArk