Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
Endgame Part 2: What’s Next for Endpoint Security?
![](/sites/default/files/styles/cropper_main_image/public/migration_image/ID%2088%20Bob%20Tarzey%20Talks%20with%20Ian%20McShane%20Part%202%20What%E2%80%99s%20Next%20for%20Endpoint%20Security%20Image.jpg.webp?itok=7B8ho-uN)
With organizations poised to spend more than $5B+ on endpoint security software this year, it raises the question: What should enterprises be asking from security vendors, and how can they parse signal from all the marketing noise?
In this podcast series, hosted by freelance analyst Bob Tarzey, he speaks to Ian McShane who as a former Gartner analyst focuses on the endpoint security market. Ian McShane has written extensively about the failure of antivirus vendors to defend against modern attacks, and the marketing hype surrounding “next-gen” antivirus.
Part 2 – What’s Next for Endpoint Security? In the previous episode, Bob Tarzey spoke to VP and endpoint security expert from Endgame, Ian McShane, about the history of endpoint security and why it needs to play an integral role for companies. In this second podcast, Bob and Ian look at the future of endpoint security and the next steps that need to be taken. This involves looking at whether security teams will have to learn new skills and also the importance of the MITRE ATT&CK framework. Like this podcast? Check out the pervious episode!
Join 34,209 IT professionals who already have a head start
Meet the panel
![](/sites/default/files/styles/user_profile_picture/public/2020-05/Ian%20McShane_0.png.webp?itok=fUN7KWgS)
Ian McShane
![](/sites/default/files/styles/user_profile_picture/public/2020-05/Bob%20Tarzey_0.jpg.webp?itok=-xYgzT2N)
Bob Tarzey
Recommended Content
Trending Content
Top 10 Best DCIM Software Solutions for 2024
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
What is Engagement Farming and is it Worth the Risk?
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Will TikTok Actually Be Banned? Exploring the US Congress Bill
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Hackers Are Exploiting the UEFA Euros for Phishing Attacks
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
What is Roko's Basilisk? The Terrifying AI Thought Experiment Explained
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)