O'Reilly logo

Endpoint Security by Mark S. Kadrich - CISSP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5. Endpoints and Network Integration

Although this is a book about endpoint security, I hope that my point regarding closed-loop process control (CLPC) and how the endpoints need to work with the network to ensure complete security has been heard.

The network and the devices and people who connect to it must work as a team if predictable and reliable control is to be achieved. Although many of us are going to have to deal with the legacy hardware and software that has been added to our networks over the course of time, some of us are in the process of designing the networks of tomorrow.

No matter what your present network state, if you make decisions that drive your network toward a closed-loop process control model, you will be in a better position ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required