In our connected world today, the use of laptops, tablets and mobile devices are all commonplace for many employees. These devices are typically connected to their corporate network, so they can access the applications and data that they use on a daily basis. However, this ability to work from anywhere with these company-owned devices creates serious security concerns.
This is where endpoint security comes into play.
According to TechTarget, endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include PCs, laptops, smart phones, tablets and specialized equipment, such as bar code readers or point-of-sale terminals.
And, the survey says …
In a recent endpoint security study by Ponemon Institute that surveyed 703 U.S. IT and IT security practitioners, the biggest problem identified was negligent or careless employees with multiple mobile devices using cloud applications and working outside the office. Since approximately 34 million people work from outside the office today, it is no wonder security issues are becoming more widespread.
The survey also indicated that mobile endpoints have been the target of malware at many organizations; and, in light of this risk, endpoint security is becoming more important in these organizations’ overall IT security strategies.
What can be done?
Endpoint security management systems can be deployed using software to identify and manage who can gain access to a corporate network. Specific policies and standards are set up and devices must comply, or they will have limited or no access to the corporate network. Typically, the components include a VPN client, an operating system and antivirus software.
Arrow recognizes the growing endpoint security risk and offers access to proven, leading technologies to help protect end-user businesses. As a result, our partners have direct access to the tools, information, products and support needed to create a secure environment for their customers.
Arrow endpoint security solution vendors include:
If you would like more information on how Arrow can help you with endpoint security, contact your Arrow representative.
Editor’s Note: This article was originally posted in August 2016 and has been updated for accuracy and comprehensiveness.
Last modified: March 27, 2019