12 types of endpoint security (original) (raw)

With the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations.

When considering overall IT security objectives, among a company's most challenging and critical elements is its endpoint security. After all, every organization, regardless of size, uses endpoint devices.

These devices are, quite literally, both endpoints of a network and entry points into it. Endpoint devices are the means for users to access a network, consume services and share data. Of course, endpoints have long been a primary target of cyberattacks, so various endpoint security technologies have been deployed to prevent or mitigate these threats.

Overview of endpoint security

Endpoint security protects devices that connect to and access an organization's network. Its primary goal is to safeguard these devices from cyberthreats and unauthorized access.

Endpoint security employs an evolving arsenal of response measures, policies and tools to protect the endpoints, often a network's most vulnerable infiltration points. Key aspects of endpoint security include the following:

Why is endpoint security important?

For organizations across the globe, endpoints, such as desktops, laptops, smartphones and tablets, are essential to access and manipulate vital data from remote locations. Without proper security measures, cybercriminals can use these devices as entry points to a company's network.

Following initial entry through an endpoint device, common attack techniques move laterally across a network and infect high-value systems, steal data or deploy ransomware, leading to a data breach. Endpoints pose unique security risks due to several factors, including the following:

What's considered an endpoint device?

An endpoint device is any device that connects to a network. Endpoints are typically end-user devices that provide the user a connection to a network and the internet at large. Endpoints are essential for daily activities performed by users worldwide. Among the different types of endpoints are the following:

Types of endpoint security

As cyberthreats evolve and become more sophisticated, endpoint security advances to provide comprehensive protection. There isn't a single endpoint security technology. In fact, due to the many and varied threats, an array of endpoint security tools has been created and enhanced to meet these ever-changing attacks, including the following:

Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.

Dig Deeper on Network security