Endpoint Security

Endpoint security protects an organization’s network when it is accessed by remote and mobile devices. When a remote device connects to the network, it can become a potential attack vector and introduce threats to the network. Endpoint security aims to reduce the risk of this happening through a combination of policies and security tools.

Terms related to Endpoint Security: Network access control, mobile device access, network access server.

Endpoint security tools are designed to secure any device that connects to an organization’s network. These devices can include smartphones, tablets, desktop and laptop computers, Internet of Things devices, or other devices allowed through a “Bring Your Own Device” program. They can also refer to any other asset that connects to a network, like on-premise servers, cloud services, or printers.

Endpoint security typically adds in extra defenses when a device accesses the network, using centrally managed security software that deploys policies and user agents to devices and strengthens protection. This can be combined with authorization protocols and multifactor authentication to ensure only legitimate users are accessing business information and systems. Endpoint security is often combined with network access control to limit what users and devices can do once they are connected.

Most endpoint security will deploy firewall, antivirus, anti-malware, and also host intrusion prevention software to remote devices, and will supplement this with security software from the central server.

Endpoint Security Resources from Crossmatch