This article can also be found in the Premium Editorial Download "Information Security magazine: Compliance vs. security: Prevent an either-or mentality."
Download it now to read this article plus other related content.
Spotlight on the Endpoint
Mobility and portability make data protection a far more complicated problem than it once was. They've given this product market traction it wouldn't have seen just a couple of years ago. As the products mature, they feature improved reporting and central management capabilities, and, in most cases, combine en-cryption with device control for stronger endpoint security.
We're starting to see similar capabilities in more comprehensive security and data protection products. Expect to see these products extend their feature sets or get folded into broader products, as larger companies continue their pattern of acquiring key new technologies.
Time and experience have taught the security community that going to the root of a problem will often save time and money. Priced on a per-user, annual basis, for larger enterprises, these products can become pricey on top of existing security solutions licensed on an annual basis, such as antivirus/antispyware. Nevertheless, endpoint security has clearly moved center stage, and many corporations are going to do what it takes to protect their data as it moves out into the world.
This was first published in March 2007