New Skills

New Training: Endpoint Security

by Team Nuggets
New Training: Keeping vSphere 7 Updated picture: A
Published on March 4, 2021

In this 6-video skill, CBT Nuggets trainer Keith Barker describes the value of endpoint device security, including multi-factor authentication, management, posture assessment, and patching. Watch this new Cisco training.

Watch the full course: Implementing and Operating Cisco Security Core Technologies

This training includes:

  • 6 videos

  • 26 minutes of training

You’ll learn these topics in this skill:

  • Introduction to Endpoint Security

  • Why Endpoint Protection is Critical

  • The Value of Mobile Device Management

  • Using Multi-Factor Authentication

  • Posture Assessment for Endpoint Security

  • Patching Endpoints

All Businesses Need An MDM Strategy

Mobile device management (MDM) is a must for businesses. It's estimated that 80% of small businesses use mobile devices for business purposes at least once per day. The popularity of bring-your-own-device programs in organizations only complicates MDM further despite its potential cost savings.

Mobile device management is a way to control information security on smartphones and tablets. There are multiple programs available for MDM in the enterprise environment. For instance, Apple offers an MDM strategy from purchase to deployment and inventory recovery for iPhones. Other services, like Cisco, offer more generalized MDM platforms that give broader control over mobile devices within the business itself.

BYOD programs complicate MDM strategies even more. One of the many features that MDM platforms offer is being able to remotely erase smartphones and tablets should an employee lose one. Businesses put themselves in a tight spot if they erase personal information from an employee-owned device, though. There are MDM solutions to work around these scenarios as well.

All businesses need to adopt some form of MDM strategy. With many employees using smartphones for both business and personal reasons, organizations need a way to control company-owned information on those devices.

Recommended Articles