Securing Remote Workforce - Erik Jansen
Автор: CyberRisk TV
Загружено: 2026-03-04
Просмотров: 20
Описание:
We'll review steps you can take to protect devices no matter where they connect, including:
•Inventory, monitor and control applications: Ensure your company has the capability to limit what applications are on machines, and what these applications may have access to through Ringfencing
•Protect inbound traffic to remote devices: Protect your east-west traffic on the endpoints with a robust endpoint firewall tool leveraging Dynamic ACLs (Dynamic Port Management). Block all inbound traffic and only allow limited outbound traffic through common ports
•Detect any indications of compromise: Pair these controls with an in-depth detection tool (ThreatLocker Detect) that watches for potential malicious behavior and alert/automate responses to these behaviors both on the Endpoint and in your M365 environment with Cloud Detect/Control
•Manage Web Content on machines off the company network with Web Control
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
Show Notes: https://securityweekly.com/ztw26-1
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: