Most organizations continue to spend most of their security budget on securing their server infrastructure, implementing things like firewalls, intrusion prevention/detection systems and SIEM solutions. The reason for this is that’s where they consider their most prized possession to be, their data. But is that the correct stance? More and more cyber-attacks now start with phishing attacks on end users, using end user devices as the entry point of the attack. In this video we take a look at some typical desktop configurations, their possible vulnerabilities and where we can reduce the chance of attack by employing some simple changes without impacting desktop performance with NSX.
NOTE: This video is roughly 20 minutes in length so it would be worth blocking out some time to watch it!