End Point Security

End Point Security

 End-point-security is an information security concept that basically means that each device (end-point) is responsible for its own security.

Traditionally, firewalls, central virus scanners and other intrusion detection or intrusion prevention devices were held responsible for securing an end-point. However with the SSLVPN, the intrusion prevention systems in the perimeter become ineffective as SSLVPN can be controlled at the two end points one being the desktop and the other outside the user control in the internet space.

End point security places the onus of security on the device itself. Real-life examples of this happening can be best seen with Broadband users' increasing use of desktop firewalls, spam and antivirus software.

A variant of the End point security is the on demand end point of security. In this concept the server sends ActiveX or java component which does the following in the client pc's :

Profiling of the client environment from perspective of firewall, antivirus, patches etc.
memory protection program to create virtual desktop whose memory is different from that of the host system.
deletes all data on exit.

Another look at endpoint security should include computer level tools that provide administrative control over the use of memory devices. Controlling the use of memory sticks, SD cards and other flash drive type memory devices. A quick test for the small business owner is to take one of these small, in size yet big in memory, storage devices to a client workstation on their network and see what kind of information an employee can take. Consider Outlook data, Word doc's, pdf's and information from the companies accounting & customer data bases. If employees are allowed to load company data onto memory sticks to take outside the office, is that information protected? Endpoint security also includes the protection of a businesses network from employee memory devices that may unknowingly contain malware.

Related Experts

Related Documents

Partners

  • 2017-01-19_11-12-42.png
  • ACDCLogo_v4_Verde_150x79.png
  • agoria.png
  • APWGEU.png
  • arc_logo.png
  • b-hive.png
  • beltug.jpg
  • bronzecluster.jpg
  • centrodecyberseguridad.png
  • computable-logo-be-small.png
  • csc.png
  • dgconnect.jpg
  • dspvalley.jpg
  • fisc.png
  • heliview.png
  • infosecurity_belgium.png
  • isaca.png
  • jaarbeurs.png
  • logo-ecso.gif
  • nsmc.png
  • polescs.jpg
  • sirris.png
  • stopthinkconnect.png
  • teletrust-logo.gif
  • UKCSFlogo.png
  • VLAIO.png
  • voka.png

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

 

LSEC for enterprise & government

lsec-gov

 

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41