Identifying Endpoint Security Ambiguity
In an astonishing stat, “the number of smartphones has today exceeded the number of people.” The pervasive use of mobile devices in enterprises has amplified productivity and connectivity within the IT framework.
Meanwhile, with the onset of BYOD trend, endpoint security is becoming more complex as the employee devices are expanding in number and sophistication. Mark Bermingham, Global Director of Kaspersky Lab remarks that mobile devices claim a greater share of workflow activities in businesses nowadays and cybercriminals place a larger threat on targeting these devices, as they are the weak links. Though, endpoint security is a network protection strategy, often it fails in ensuring security of sensitive data and device protection. Endpoint security often has its own technical shortcomings and organizations need to make compelling advancements to live upto contemporary threats.
Endpoint Security Loopholes:
The problem is not exactly with the technology; it is often with the process and implementation. Real time monitoring needs to be implemented to tackle with the overabundance of security alerts and updates and avoid security breach. Endpoints are vulnerable to attacks as they can be easily accessed through remote devices.
To mitigate risks, firewalls, antivirus and other defensive tools are essential but to stop today’s advanced security breaches, enterprises need something more solid. Companies do not abundantly adopt user activity monitoring and forensic capabilities in modern times as they can drastically lower the attack attempts. According to Gartner, by 2020, 60 percent of enterprise information security budgets will be allocated for rapid detection and response approaches. But misconceptions about endpoint security are high. Organizations often install it and leave rest to the technology. Timely updates and monitoring makes the process prolific. To have an antivirus as the endpoint security measure is not enough. In order to achieve an effective model, one would need layered security on endpoints, workstations, laptops, cell phones, as well as on the server are linked with. Incompetent Patching can also lead to malicious attacks, compromising endpoint security. Companies should anticipate breaches, and move to a continuous monitoring cycle to augment their defense in depth posture. Anti-spyware, firewalls, intrusion detection, and prevention come along with the antivirus. Antivirus alone is not enough to ensure a robust endpoint security and that’s where enterprises pay the piece. Augmenting to firewalls and anti-spyware, companies also need a specialist on endpoint security/protection in their bend.
Strategizing a Security Plan
To protect the integrity of enrolled devices is one of the basic tasks assigned to security management. Configuring controls, enforcing controls, checking integrity, detecting compromise are some of the basic tasks assigned to security management of endpoint devices.. A perpetual threat to security blows down the chances of proliferating endpoint devices extensively and through company’s security management, enterprises are looking to find a remedy. PIN/password creation, login/logout time specifications, inactivity timeout specification, device restrictions, and data encryptions are some primary features of security management function of EMDM (Enterprise Mobile Device Management).
So these endpoint devices are considered most vulnerable to cyber abuses and breaches and organizations need to strategize a security plan to ensure maximum protection from these technological culprits.
Subtle Security in Future
While a normal mobile user is worried about simple operating system breaches, enterprises have much complicated issues like data security challenges, safe browsing, storage of files and data, loss or theft of device, malware, spam and phishing. Along with developing advanced endpoint-specific security options, security solution providers should guarantee that organizations are taking full advantage of the endpoint security solutions and educate them on the security technologies they can use according to their business objectives.
By Phil Jarvis, VP, IT, Thirty-One Gifts
By Dr.Chris Ewell, CISO, Seattle Children
By Eloise Young, CIO, Philadelphia Gas Works
By Phil Stevens, CIO, The Exchange
By Herman Nell, SVP & CIO, Rent-A-Center
By John Honeycutt, CTO, Discovery Communications
By Mark Wead, Chief Enterprise Architect– North America...
By Federico Flórez, Chief Information & Innovation Officer,...
By David Berry, CIO, Daymon Worldwide
By Douglas Turk, Chief Marketing Officer, JLT Speciality
By Tekin Gulsen, CIO, Global IT & Corporate Planning...
By John Sprague, Deputy CTO, IT and the End User Architect,...
By Craig C Shrader, CIO Engagement Partner, Tatum, a...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By Jeff Katz, CTO, Energy & Utilities, IBM [NYSE:IBM]
By Dr Dirk E Mahling, VP, Technology, Alliant Energy
By Steven John, CIO, AmeriPride Services
By Leon Ravenna, CISO, KAR Auction Services, Inc.