To ensure that your infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. Most organizations already have some endpoint security controls implemented -- firewall, antivirus and patch management – but the endpoint security market has evolved and products have become much more complex than these three basic technologies.
In this
Requires Free Membership to View
Three
ways to prioritize endpoint security over perimeter defenses
One of the most important elements of information security is keeping desktops and servers secure.
It's a difficult job, and lots of IT staff members are feeling the pain -- relying on secondary
defenses, such as perimeter firewalls, for protection. But that's not an ideal approach. Even if it
seems a nearly impossible task, organizations must concentrate on endpoint security management to
have a truly solid security foundation.
In this tip, read why organizations should prioritize endpoint security over perimeter defenses and learn several tips and best practices for refocusing your network security efforts on the endpoint.
Bringing
the network perimeter back from the 'dead'
A number of security professionals and consulting firms have expressed the importance of endpoint
security, going so far as to say the perimeter is dead.
In this tip, Mike Chapple, expressing his contrasting opinion, explains why reliable, endpoint protection technologies are still an essential part of a layered enterprise network defense. Chapple also discusses the maturity of endpoint protection technology and how to maintain and adapt endpoint security channels.
Think
about performance, data protection when choosing endpoint security suites
Antimalware protection has evolved to include the use of complex endpoint security suites with
multiple malware detection techniques and features, such as host-based intrusion prevention (HIPS)
and full-disk encryption. Endpoint security suites offer multiple malware detection techniques and
data protection features, which are especially appealing to midmarket IT organizations.
In this tip, learn some of the key points to should consider in choosing, keeping or upgrading your endpoint security software before your next subscription renewal.
Keeping
pace with emerging endpoint security technologies
Vendors have responded to the deperimeterization of corporate networks with products designed to
ensure the security of connecting devices, permitting access based on the security status of the
endpoint.
This article provides an overview of endpoint security technology market activity and briefly explains where the technology may be headed. You'll gain a clear understanding of where the larger players such as Cisco, Microsoft and Trusted Computing, and the smaller, best-of-breed players are headed, and how it all fits together. You'll also learn how these strategies compare and best practices for preparing endpoint security investments for the future.
How
Juniper and F5 SSL VPNs can handle endpoint security
It's not easy setting up an endpoint security system, especially when using an existing SSL VPN
architecture.
In this tip, expert David Strom uses words and pictures to illustrate several steps needed, including how to set up the various endpoint security policies, and how to implement them for particular groups of users, in order to enable endpoint security using the SSL VPNs from Juniper and F5.
Effective
endpoint security without a significant investment
Vendors are always touting new products to manage endpoint security, but some of these options can
be costly and organizations can't afford the expense.
In this tip, learn exactly what an endpoint is and discover how to implement effective endpoint protection at a low cost by effectively managing three technologies most organizations already employ: firewall, antivirus and patch management.
Top tactics
for endpoint security
The landscapes of today's enterprise networks are radically different than they were 10 years ago.
IT staffs no longer have control over every endpoint connecting to the network, leading to a host
of problems where access control is weak or nonexistent, and the endpoints are not properly
secured.
This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access. Learn best practices for creating a centrally managed endpoint security architecture, get insight into integrating a variety of network access control technologies in an organization's identity management program and receive tips for deploying an endpoint architecture that will cover all access paths.
This was first published in October 2009
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation