Identifying Endpoint Security Ambiguity
In an astonishing stat, “the number of smartphones has today exceeded the number of people.” The pervasive use of mobile devices in enterprises has amplified productivity and connectivity within the IT framework.
Meanwhile, with the onset of BYOD trend, endpoint security is becoming more complex as the employee devices are expanding in number and sophistication. Mark Bermingham, Global Director of Kaspersky Lab remarks that mobile devices claim a greater share of workflow activities in businesses nowadays and cybercriminals place a larger threat on targeting these devices, as they are the weak links. Though, endpoint security is a network protection strategy, often it fails in ensuring security of sensitive data and device protection. Endpoint security often has its own technical shortcomings and organizations need to make compelling advancements to live upto contemporary threats.
Endpoint Security Loopholes:
The problem is not exactly with the technology; it is often with the process and implementation. Real time monitoring needs to be implemented to tackle with the overabundance of security alerts and updates and avoid security breach. Endpoints are vulnerable to attacks as they can be easily accessed through remote devices.
To mitigate risks, firewalls, antivirus and other defensive tools are essential but to stop today’s advanced security breaches, enterprises need something more solid. Companies do not abundantly adopt user activity monitoring and forensic capabilities in modern times as they can drastically lower the attack attempts. According to Gartner, by 2020, 60 percent of enterprise information security budgets will be allocated for rapid detection and response approaches. But misconceptions about endpoint security are high. Organizations often install it and leave rest to the technology. Timely updates and monitoring makes the process prolific. To have an antivirus as the endpoint security measure is not enough. In order to achieve an effective model, one would need layered security on endpoints, workstations, laptops, cell phones, as well as on the server are linked with. Incompetent Patching can also lead to malicious attacks, compromising endpoint security. Companies should anticipate breaches, and move to a continuous monitoring cycle to augment their defense in depth posture. Anti-spyware, firewalls, intrusion detection, and prevention come along with the antivirus. Antivirus alone is not enough to ensure a robust endpoint security and that’s where enterprises pay the piece. Augmenting to firewalls and anti-spyware, companies also need a specialist on endpoint security/protection in their bend.
Strategizing a Security Plan
To protect the integrity of enrolled devices is one of the basic tasks assigned to security management. Configuring controls, enforcing controls, checking integrity, detecting compromise are some of the basic tasks assigned to security management of endpoint devices.. A perpetual threat to security blows down the chances of proliferating endpoint devices extensively and through company’s security management, enterprises are looking to find a remedy. PIN/password creation, login/logout time specifications, inactivity timeout specification, device restrictions, and data encryptions are some primary features of security management function of EMDM (Enterprise Mobile Device Management).
So these endpoint devices are considered most vulnerable to cyber abuses and breaches and organizations need to strategize a security plan to ensure maximum protection from these technological culprits.
Subtle Security in Future
While a normal mobile user is worried about simple operating system breaches, enterprises have much complicated issues like data security challenges, safe browsing, storage of files and data, loss or theft of device, malware, spam and phishing. Along with developing advanced endpoint-specific security options, security solution providers should guarantee that organizations are taking full advantage of the endpoint security solutions and educate them on the security technologies they can use according to their business objectives.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure