Chapter 10

Endpoint Policies and Standards

This chapter covers the following topics:

  • Asset Management: This section discusses the importance of tracking devices and maintaining inventories for cybersecurity professionals.

  • Program Deployment: This section discusses manual and automated methods for deploying programs to endpoints.

  • Backups: This section discusses classification of backups based on their locations and how they function.

  • Bring Your Own Device (BYOD): This section discusses the benefits and drawbacks of BYOD, implementation considerations, and supporting management tools.

  • Regulatory Compliance: This section discusses the relevance of PCI-DSS, HIPAA, and GDPR to endpoint security

Networks make little sense without the endpoints that ...

Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.