My InfoTech Journal:
Endpoint Security
What Is Endpoint Security?
Endpoint Security refers to protecting your endpoint devices connected to your network from external threats targeting the vulnerabilities from these endpoint devices.
Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware and evolving zero-day threats. 1
Organizations of all sizes are at risk from nation-states, hacktivists, organized crime, and malicious and accidental insider threats. Endpoint security is often seen as cybersecurity's frontline, and represents one of the first places organizations look to secure their enterprise networks. 1
As the volume and sophistication of cybersecurity threats have steadily grown, so has the need for more advanced endpoint security solutions. Today’s endpoint protection systems are designed to quickly detect, analyze, block, and contain attacks in progress. To do this, they need to collaborate with each other and with other security technologies to give administrators visibility into advanced threats to speed detection and remediation response times. 1
What are Endpoint Clients?
Endpoint Clients refer to devices that your end-users use. These are devices like: Computers (Desktop or Laptops), iOS devices (iPhone, iPad, iWatch), Smart Phones, Smart Tablets, Smart Watches, Point-Of-Sales (POS) devices, Automated Teller Machines (ATM), Medical Instructions, Servers and a lot of other devices that are connected to your network.
Endpoint Security Risks
These Endpoint Devices are target entry points from external threats like malware, phishing, social engineering, identify theft, and other threat vectors.
The vulnerabilities of these endpoint devices can be exploited to gain unauthorized access to your network and to eventually gain control of your systems.
Recent events proved that if these vulnerabilities are not resolved or patched and if no security control measures are in place, there will be higher risks and high probability of your systems being breached.
News of companies being attacked with ransomware has been reported to have doubled in the second-half of 2021.
Here is a statement from Michael Sentanos, Chief Technology Officer at CrowdStrike as published by Forbes in the article: Ransomware Double: the Trouble in 2021
“Without fail, ransomware has continued to be at the forefront of cybersecurity concerns in 2021. The 2020 CrowdStrike Global Security Attitude Survey revealed that 56% of organizations surveyed worldwide suffered a ransomware attack in 2020. Among these organizations, 27% of them chose to pay their attackers, costing on average $1.1 million per ransom.
Ransomware remains a high-priority threat, continuing in much the same way that 2020 left off. However, the stakes are even higher in 2021. Significant ransomware attacks in the first quarter of the year are already trending toward especially high payout demands, with a recent record-breaking ransomware demand reportedly amounting to $50 million. To stem the tide of these growing threats, organizations must understand the evolutionary trajectory of ransomware and bolster their defenses comprehensively to safeguard their funds, data and customer trust.” 3
Endpoint Security Project
- Virus / Malware Protection
- Data Loss Protection (DLP)
- Network Protection
- Application Protection
- eMail Protection
- Web Protection
- Desktop Protection
- Mobile Security
- Access Control
Gartner Report: Endpoint Protection Platforms 3
- Microsoft
- CrowdStrike
- TrendMicro
- SentinelOne
- McAfee
- Sophos
End Notes
Disclaimer
This article is a result of my personal research and is not a substitute for legal advise.
Please consult your Legal Team, Ethics & Compliance, or Regulatory Team for the interpretation of specific CyberSecurity requirements.
Comments
Post a Comment