Protecting Your Endpoints from Ransomware: Top Do’s, Don’ts and Gotchas

Date: Tuesday, June 27 at 11am PT / 2pm ET

Last year, a Ponemon Institute survey found that enterprises have an average of 135,000 endpoint devices they have to secure. Even if you’re a midsized business or SMB, your number of endpoint devices is likely in the many hundreds or even thousands. That’s a staggering amount of entry points for attackers to target with ransomware. On top of that, we’ve all been told that ransomware is a matter of “when,” not “if.” How can you make sure that all of those endpoints -- each with different user, security and compliance requirements – don’t put the rest of your organization and its data at risk when one of them gets compromised? What makes a good ransomware security strategy, and how can you scale it as the number of endpoints in your organization grows? What are the top best practices for protecting against ransomware today – and what should you absolutely never do?

Join us for this free, one-hour Tech Talk where you’ll learn the answers to all of these questions and more. The ransomware threat isn’t going away, and it’s only getting more effective, damaging and expensive to mitigate. Stay prepared – register today!

Register now!

About the presenters:

Jody Evans, Product Manager, Quest

Jody has spent over 20 years in the systems management industry. His roles range from systems management consultant to Learning and Development manager to Product Manager. Over his career, Jody has managed projects for customers in small shops to globe-spanning, multinational organizations. Jody has become a trusted advisor during the product development process for KACE products and has supported several groups in their efforts to bring releases to market. These efforts led him to where he is today as a Product Manager for KACE solutions.


Moderated by:
Gladys Rama, Editorial Director, Redmondmag.com



Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.