Select and Implement a Next Generation Endpoint Protection Solution
Today’s security battles are fought at the endpoint.
RETIRED CONTENT
Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.A poor endpoint protection procurement process one can result in:
- A lack of situational awareness, leaving the organization vulnerable to threats.
- A false sense of security.
- A waste of invested time and resources.
- False positives that misdirect management and organizational efforts.
A streamlined endpoint protection procurement process will help you:
- Enhance your security program by selecting, implementing, and streamlining the most appropriate next generation endpoint protection suite.
- Identify the use case and corresponding feature set that best aligns with your organizational landscape.
- Increase situational awareness through continuous endpoint prevention, detection, analysis, and response technique.
- Design a step-by-step NG-EPP implementation process.
- Pursue continuous improvement; build a measurement program that actively evaluates program effectiveness.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Module 1: Create An Effective Endpoint Protection Strategy
The Purpose
- Assess the use case and corresponding feature set that best aligns with your organizational landscape.
Key Benefits Achieved
- Determine why you need a new endpoint protection solution.
- Understand Info-Tech’s use-case approach.
- Evaluate current endpoint protection feature sets and criteria.
| Activities: | Outputs: | |
|---|---|---|
| 1.1 | Determine if an EPP solution is right for you. |
|
| 1.2 | Identify your unique use-case scenario. |
|
| 1.3 | Evaluate the EPP feature sets. |
|
Module 2: Select an Endpoint Protection Solution
The Purpose
- Streamline your endpoint procurement process by identifying the vendor that best satisfies your use-case criteria.
Key Benefits Achieved
- Optimize your endpoint protection procurement process.
- Determine EPP vendor criteria.
- Evaluate the EPP marketspace.
- Design, submit, and evaluate vendor RFPs.
| Activities: | Outputs: | |
|---|---|---|
| 2.1 | Analyze the vendor landscape. |
|
| 2.2 | Create a custom vendor shortlist. |
|
| 2.3 | Develop an RFP. |
|
| 2.4 | Standardize a vendor demo script. |
|
| 2.5 | Assess the total cost of ownership and return on investment of each solution. |
|
Module 3: Implement and Manage Your Endpoint Protection Solution
The Purpose
- Prepare for the EPP implementation and measure the value of the solution.
Key Benefits Achieved
- Identify the appropriate resourcing plan for your endpoint protection solution.
- Plan the implementation.
- Design, build, test, and roll out the solution.
- Develop a comprehensive measurement program.
| Activities: | Outputs: | |
|---|---|---|
| 3.1 | Plan for your implementation. |
|
| 3.2 | Evaluate the success of your endpoint implementation. |
|