What is Endpoint Security?

What is Endpoint Security
You are here:

Endpoint security is a client/server information security (IS) methodology for protecting a corporate network through focusing on network devices (endpoints) by monitoring their status, activities, software, authorization and authentication.

Security software is installed on any endpoint device, as well as network servers. Such software may include antivirus, antispyware, firewall and a host intrusion prevention system (HIPS)

Techopedia explains Endpoint Security

For management and IT security personnel, endpoint security is an increasingly critical element for corporate networks as more employees and authorized outsiders (like business partners, consultants, customers and clients) are granted network access through the Internet and/or a variety of mobile devices.

Endpoint security is evolving with technological advances. Security elements now include intrusion protection and prevention, as well as behavior blocking software to monitor endpoint device activities for unsanctioned applications or malicious intent.

Some complex endpoint security programs focus on user device authentication. As a user attempts to login, credentials are validated, and the device is scanned for compliance with corporate policies, which may include a scan for unauthorized software (such as games and peer-to-peer applications), updated virtual private network (VPN), antivirus software, a firewall, mandatory corporate software and an approved operating system (OS).

Devices that don’t meet such corporate policies may be granted limited access or quarantined. This is known as network access control (NAC), which is used to unify many elements of endpoint security technology. When access is provided, it is often according to the user’s profile. For example, a human resources (HR) employee may be given only general access to a network and HR department files.

Last Updated On October 24, 2018

Julia Sowells698 Posts

Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register