WEBVTT 0:00:02.160000 --> 0:00:03.900000 Hello and welcome to this video. 0:00:03.900000 --> 0:00:09.460000 In this video, I've titled it categories of endpoint protection. 0:00:09.460000 --> 0:00:11.320000 It's going to be a very brief video. 0:00:11.320000 --> 0:00:15.100000 I'm just going to go over the topic of what is endpoint protection, so 0:00:15.100000 --> 0:00:18.880000 you're familiar with that term and real quickly just give you some different 0:00:18.880000 --> 0:00:22.000000 categories of endpoint protection. 0:00:22.000000 --> 0:00:24.760000 And then we'll go into more details of what each of those categories are 0:00:24.760000 --> 0:00:26.820000 in different videos. 0:00:26.820000 --> 0:00:31.440000 So, maybe you've never heard this term before, endpoint protection. 0:00:31.440000 --> 0:00:33.140000 What is that talking about? 0:00:33.140000 --> 0:00:37.840000 Well, certainly you have data in your laptop, in your PC, in your server 0:00:37.840000 --> 0:00:39.340000 that's critical to you. 0:00:39.340000 --> 0:00:42.960000 You do not want malicious actors getting a hold of that data. 0:00:42.960000 --> 0:00:46.260000 I'm sure you can imagine certain types of data that would be very detrimental 0:00:46.260000 --> 0:00:50.400000 to you if somebody got a hold of it and used it against you. 0:00:50.400000 --> 0:00:56.320000 So, in a network, we need multiple lines of defense to protect that critical 0:00:56.320000 --> 0:01:00.740000 sensitive data. We should have firewalls in place somewhere. 0:01:00.740000 --> 0:01:05.160000 We should have routers that have access lists that are password protected. 0:01:05.160000 --> 0:01:09.400000 We should have switches that also might have maybe VLAN access lists, 0:01:09.400000 --> 0:01:13.820000 private VLANs, other features on the switches itself. 0:01:13.820000 --> 0:01:16.800000 And then we should also have it as a very last line of defense endpoint 0:01:16.800000 --> 0:01:19.660000 protection. What is that? 0:01:19.660000 --> 0:01:23.420000 So, endpoint protection is basically just a fancy term that says, what 0:01:23.420000 --> 0:01:28.480000 do you have on your laptop or server itself as a last line of defense 0:01:28.480000 --> 0:01:31.000000 to protect against malware? 0:01:31.000000 --> 0:01:35.740000 Typically, this takes the form of some sort of software or multiple types 0:01:35.740000 --> 0:01:41.560000 of applications or software running in parallel on your end system. 0:01:41.560000 --> 0:01:44.420000 So, that's what we really mean by endpoint protection. 0:01:44.420000 --> 0:01:48.900000 So, there's more than one type of endpoint protection. 0:01:48.900000 --> 0:01:52.560000 There's more than one type of software you want running on your server 0:01:52.560000 --> 0:01:57.060000 or your laptop to protect you in the event that all those other layers 0:01:57.060000 --> 0:02:01.160000 of protection, your firewall, your cloud web security, whatever it is, 0:02:01.160000 --> 0:02:05.960000 fail and stuff gets through and ultimately ends up on your laptop. 0:02:05.960000 --> 0:02:09.760000 So, those categories of endpoint protection that you could have take the 0:02:09.760000 --> 0:02:14.620000 form of antivirus software, most operating systems already have some flavor 0:02:14.620000 --> 0:02:18.940000 of antivirus software pre-installed, but you can certainly download other 0:02:18.940000 --> 0:02:22.020000 ones, either free or paid versions. 0:02:22.020000 --> 0:02:29.260000 Anti-spyware to prevent people from installing keyloggers and other things. 0:02:29.260000 --> 0:02:34.940000 Malware analysis and protection software, personal firewalls, certainly 0:02:34.940000 --> 0:02:40.960000 you could encrypt your information. 0:02:40.960000 --> 0:02:42.700000 Malware analysis and protection software, which is very important. 0:02:42.700000 --> 0:02:42.940000 It's a very important thing to do with the endpoint protection. 0:02:42.940000 --> 0:02:46.220000 So, you can also use some sort of virtual private networks as well. 0:02:46.220000 --> 0:02:50.640000 So, all of those because they're actually installed and utilized on the 0:02:50.640000 --> 0:02:55.220000 endpoint itself, once again the endpoint is your server, your laptop, 0:02:55.220000 --> 0:02:59.540000 your tablet, all of those would be categories of endpoint protection. 0:02:59.540000 --> 0:03:03.240000 We will get into more details of what each one of those are and give you 0:03:03.240000 --> 0:03:04.980000 some examples of those coming up. 0:03:04.980000 --> 0:03:07.540000 So, thank you very much for watching this video.