Chapter 10
Endpoint Policies and Standards
This chapter covers the following topics:
Asset Management: This section discusses the importance of tracking devices and maintaining inventories for cybersecurity professionals.
Program Deployment: This section discusses manual and automated methods for deploying programs to endpoints.
Backups: This section discusses classification of backups based on their locations and how they function.
Bring Your Own Device (BYOD): This section discusses the benefits and drawbacks of BYOD, implementation considerations, and supporting management tools.
Regulatory Compliance: This section discusses the relevance of PCI-DSS, HIPAA, and GDPR to endpoint security
Networks make little sense without the endpoints that ...
Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.