Endpoint Security
Get Endpoint Security essential facts below. View Videos or join the Endpoint Security discussion. Add Endpoint Security to your PopFlock.com topic list for future reference or share this resource on social media.
Endpoint Security

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]

The endpoint security space has evolved over the last several years away from limited antivirus software and into a more advanced, comprehensive defense. This includes next-generation antivirus, threat detection, investigation, and response, device management, data leak protection (DLP) and other considerations to face evolving threats.

Corporate network security

Endpoint security management is a software approach which helps to identify and manage the users' computer and data access over a corporate network.[4] This allows the network administrator to restrict the use of sensitive data as well as certain website access to specific users, in order to maintain and comply with the organization's policies and standards. The components involved in aligning the endpoint security management systems include a virtual private network (VPN) client, an operating system and an updated endpoint agent.[5] Computer devices that are not in compliance with the organization's policy are provisioned with limited access to a virtual LAN.[6]Encrypting data on endpoints and removable storage devices helps to protect against data leaks.[7]

Client and server model

Endpoint security systems operate on a client-server model, with the security program controlled by a centrally managed host server pinned[clarification needed] with a client program which is installed on all the network drives.[8][9] There is yet another model called the software-as-a-service (SaaS), the security programs and the host server are maintained remotely by the merchant. In the payment card industry, the contribution from both the delivery models is that the server program verifies and authenticates the user login credentials and performs a device scan to check if it complies with a designated corporate security standards prior to permit network access.[10][11]

In addition to protecting an organization's endpoints from potential threats, endpoint security allows IT admins to monitor operation functions and data backup strategies.[12]

Endpoint protection platforms

Endpoint protection platforms (EPP) are solutions that can be deployed on the endpoint to protect against file-based, fileless, and other types of malware, through prevention and investigation and remediation capabilities[13]. A number of vendors produce systems converging EPP systems with Endpoint Detection and Response (EDR) platforms - systems focused on threat detection, response and unified monitoring.[14]

See also


  1. ^ "Endpoint security management overview". Retrieved 2015.
  2. ^ "What is endpoint security and how does it work?". Retrieved 2015.
  3. ^ "What is endpoint security?". Retrieved 2015.
  4. ^ "Endpoint security & network protection". Retrieved 2015.
  5. ^ "Endpoint security standard". October 7, 2015.
  6. ^ Endpoint security and compliance management design guide. Redbooks. October 7, 2015.
  7. ^ "What is Endpoint Security?". Forcepoint. August 9, 2018. Retrieved 2019.
  8. ^ "Centrally managed host server". Microsoft. October 7, 2015.
  9. ^ "Client-server security". Exforsys.
  10. ^ "mobile devices especially vulnerable".
  11. ^ "PCI and Data Security Standard" (pdf). October 7, 2015.
  12. ^ "12 essential features of advanced endpoint security tools". SearchSecurity. Retrieved 2019.
  13. ^ Inc, Gartner. "Endpoint Security and Protection Software Reviews". Gartner. Retrieved 2019.
  14. ^ Gartner (August 20, 2019). "Magic Quadrant for Endpoint Protection Platforms". Retrieved 2019.

  This article uses material from the Wikipedia page available here. It is released under the Creative Commons Attribution-Share-Alike License 3.0.



Music Scenes