End point security

End point security

End-point-security is an information security concept that basically means that each device (end-point) is responsible for its own security.

Traditionally, firewalls, central virus scanners and other intrusion detection or intrusion prevention devices were held responsible for securing an end-point. However with the SSLVPN, the intrusion prevention systems in the perimeter become ineffective as SSLVPN can be controlled at the two end points one being the desktop and the other outside the user control in the internet space.

End point security places the onus of security on the device itself. Real-life examples of this happening can be best seen with Broadband users' increasing use of desktop firewalls, spam and antivirus software.

A variant of the End point security is the on demand end point of security. In this concept the server sends ActiveX or java component which does the following in the client pc's :

Profiling of the client environment from perspective of firewall, antivirus, patches etc.
memory protection program to create virtual desktop whose memory is different from that of the host system.
deletes all data on exit.

Another look at endpoint security should include computer level tools that provide administrative control over the use of memory devices. Controlling the use of memory sticks, SD cards and other flash drive type memory devices. A quick test for the small business owner is to take one of these small, in size yet big in memory, storage devices to a client workstation on their network and see what kind of information an employee can take. Consider Outlook data, Word doc's, pdf's and information from the companies accounting & customer data bases. If employees are allowed to load company data onto memory sticks to take outside the office, is that information protected? Endpoint security also includes the protection of a businesses network from employee memory devices that may unknowingly contain malware.

Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Check Point — Software Technologies Ltd. Lema Aseguramos Internet Tipo Pública (NASDAQ: CHKP) NASDAQ 100 Fundación 1993 …   Wikipedia Español

  • End time — End time, End times, or End of days are the eschatological writings in the three Abrahamic religions and in doomsday scenarios in various other non Abrahamic religions. In Abrahamic religions, End times are often depicted as a time of tribulation …   Wikipedia

  • Cisco Security Agent — Developer(s) Okena/Cisco Stable release / June 7th, 2010 Operating system Cross platform Type Security / IPS …   Wikipedia

  • Point-to-Point Protocol over Ethernet — PPPoE, Point to Point Protocol over Ethernet, is a network protocol for encapsulating Point to Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services where individual users connect to the ADSL transceiver (modem) …   Wikipedia

  • Point of No Return (Babylon 5) — Infobox Television episode Title = Point of No Return Series = Babylon 5 Caption = Season = 3 Episode = 9 Airdate = 26 February 1996 Production = 309 Writer = J. Michael Straczynski Director = Jim Johnston Guests = Majel Barrett (Lady Morella)… …   Wikipedia

  • Security clearance — For use by the United Nations, see Security Clearance (UN) A security clearance is a status granted to individuals allowing them access to classified information, i.e., state secrets, or to restricted areas after completion of a thorough… …   Wikipedia

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • Point Theatre — For other uses, see The Point. For the rebranded venue, see The O2, Dublin. The Point Theatre (often referred to as the Point Depot or simply as the Point) was a concert and events venue in Ireland, that ran from 1988 2007, enjoyed by in excess… …   Wikipedia

  • End-to-end encryption — Description End to end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels (eg. public networks) to its recipient where… …   Wikipedia

  • Security community — A security community is a region in which a large scale use of violence (such as war) has become very unlikely or even unthinkable. cite journal|title=Security Communities and Their Values: Taking Masses Seriously|journal=International Political… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”