Mastering endpoint security implementation
More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
One of the best things about the business world today is the amount of flexibility we have in our working lives. Thanks to mobile devices, from smartphones to tablets to laptops, we can work more or less anywhere with an internet connection and at hours that enable a better work-life balance.
Similarly, the Internet of Things (IoT) is introducing a number of sensors and small devices that can help organisations with everything from productivity monitoring to increased automation and preventative maintenance.
However, each of these endpoints represents a potential security threat to the business.
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
According to The Cost of Insecure Endpoints report from the Ponemon Institute, 55% of vulnerable endpoints contain sensitive or confidential data. If these endpoints are lost, stolen or otherwise accessed by a malicious actor, for example through spyware, this data is at risk. Not only that, but a compromised endpoint can allow a bad actor access not only to the information stored on it or passed through it, it can also offer an opportunity for such an individual to infiltrate the corporate network itself.
Therefore, IT has had to turn its attention to implementing endpoint and data security solutions in addition to network security to ensure businesses' data remains secure.
What is endpoint security?
Endpoint security is the practice of protecting individual user devices that connect to a corporate network, as well as the confidential data they hold. Typically, this is applied through the use of centrally managed software that communicates with client software installed on each device.
Like any other security policy, endpoint security protects against existing and emerging threats to software, although devices tend to be targeted most often by the likes of trojans, which are designed to spread the reach of botnets, or occasionally ransomware.
Given that endpoint security is often offered as part of a software package, capabilities can differ depending on the provider. Most basic suites will offer antivirus protection, antispyware functions, firewalls, and host intrusion prevention systems (HIPS). You might also find data loss prevention, email encryption, network access control, endpoint detection, and application whitelisting services offered as part of the package, although the way these are deployed might vary and not all of them will be discrete options.
Endpoint security implementation best practices
What configuration of endpoint security services will be most effective will depend on the business you’re in. For example, a business that operates a bring your own device (BYOD) policy, or has a large number of IoT sensors deployed across a manufacturing line, will have notably different security needs over a business that runs a single traditional office environment.
However, there are some basic principles that every business will need to follow if they hope to get the most from endpoint security.
Know the risks
When planning this kind of security strategy, it's important to know what your endpoint landscape looks like. This can include a survey of your IT estate (company-issued laptops, PCs and smartphones, for example) as well as an audit of what personal devices access corporate data and which users they belong to.
It's also important to understand what data is passing through your endpoints. This can help establish an access management policy not just by the user but by the endpoint, which can help catch security threats early through behavioural analysis.
It's also worth keeping in mind any regulations in your industry, such as GDPR, that could dictate who is able to access what data.
Deploy endpoint protection
Antivirus on the endpoint is not enough nowadays. Endpoint security needs to cover as many threats as possible, so protection software needs to offer malware protection, application whitelisting, access control and so on.
Sometimes, one endpoint protection suite isn't enough. You may find that it's better for you to add dedicated antimalware, plus a separate access control or containerisation system, plus a level of artificial intelligence or machine learning to help detect divergence in normal behaviour or unknown devices trying to connect. However, bear in mind you will also need to manage all these setups, so a single solution that fits your needs as closely as possible may be more practical.
Amid all this focus on endpoints, it's also important not to forget the network perimeter. Corporate firewalls, data encryption and segregation are all still vital components of any security strategy.
Endpoint security in 2020
If anything, the events of 2020 have made endpoint security even more important than it was before. The shift to a remote-working model experienced by many organisations has compounded many of the risks associated with a profusion of endpoints, and created a greater challenge for IT departments trying to keep on top of things.
While some companies may have been investing in agile and remote working setups before the pandemic hit, equipping their workforce with laptops and other tech that could facilitate them working wherever they wanted or needed, other businesses will no doubt have been blindsided by the injunction for their employees to work from home if at all possible. BYOD will have boomed in many places, with many workers having no option but to switch to using personal devices for business purposes. Far outside of the company premises, maintaining protection and oversight of these multiplying endpoints is a challenge for IT departments.
Fortunately, as circumstances change, so too do endpoint security systems advance. Available services are becoming increasingly sophisticated, and some have endpoint detection tools built-in, so no device connected to your network goes unnoticed. The key is to bear in mind the endpoint security challenges and seek solutions as quickly as possible.
Digital document processes in 2020: A spotlight on Western Europe
The shift from best practice to business necessityDownload now
Four security considerations for cloud migration
The good, the bad, and the ugly of cloud computingDownload now
VR leads the way in manufacturing
How VR is digitally transforming our worldDownload now
Deeper than digital
Top-performing modern enterprises show why more perfect software is fundamental to successDownload now