Friday, March 29, 2019

Word of the Day: endpoint security management

Word of the Day WhatIs.com
Daily updates on the latest technology terms | March 29, 2019
endpoint security management

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include PCs, laptops, smartphones and tablets, as well as wearables and specialized equipment such as bar code readers, intelligent sensors and point of sale (POS) terminals.

Each endpoint in an organization provides multiple attack vectors against the organization's systems, networks and data. Although the perimeter firewall and end-user awareness training remain an important part of defense-in-depth security, the bulk of an organization's security efforts should focus on network endpoint security controls.

The business benefits of endpoint security management include decreasing the number of data breaches and other incidents, easing the deployment of new security technologies, reducing costs and blocking unwanted activity.

Endpoint security management software

Endpoint security management systems, which can be purchased as software or as a dedicated appliance, discover, manage and control computing devices that request access to the corporate network. Endpoint security systems work on a client/server model in which a centrally managed server or gateway hosts the security program and an accompanying client program is installed on each network device. In a software-as-a-service (SaaS) delivery model, the host server and its security programs are maintained remotely by the vendor.

In either delivery model, when a client attempts to log onto the network, the server program validates user credentials. Required elements may include an approved operating system, a VPN client and anti-virus software with current updates. Devices that do not comply with policy are given limited access or quarantined on a virtual LAN (VLAN). Endpoints that do not comply with policy can be controlled by the system to varying degrees. For example, the system may remove local administrative rights or restrict Internet browsing capabilities.

Quote of the Day

 
"Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions." - Kevin Beaver

Learning Center

 

NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released its 2019 Advanced Endpoint Protection Group Test results this month at RSA Conference. The vendor's CTO, Jason Brvenik, discusses the results, the challenges in testing the products and how the endpoint protection market is changing.

How EDR tools can improve endpoint security
EDR tools, a relatively new category of proactive endpoint security tools, can help in IT's fight against malware. Find out if EDR is a good option for your deployment.

Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell announced its partnership with CrowdStrike and Secureworks to launch SafeGuard and Response, an endpoint security portfolio designed to prevent, detect and respond to threats facing enterprises -- especially midmarket companies.

How to address endpoint security issues caused by users
There are several common endpoint security issues that users cause, including weak passwords and unsecured network connections. IT should handle these with security policies that address the behaviors directly.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

Quiz Yourself

 
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

No comments: