SBN

The Evolution of Endpoint Security – Changing with the Currents

Introduction

Traditionally, endpoint servers within organizations were managed by IT departments to contain endpoint security. But with the constant changes in the world of threats and attack vectors, how is endpoint security evolving to manage these threats?

In this article, we’ll take a look at how endpoint security has evolved throughout the years and the different trends that can be anticipated for the future, starting today and going forward. We will also look at some endpoint solutions and how they compare with each other.

What Is Endpoint Security?

Endpoint security is a method used within network security to secure the organization’s network against devices that connect to that network. These devices include mobile phones, laptops, tablets and any other network enabled devices that connect to organizations.

In the past, traditional endpoint security has been achieved by having a server within the internal network of the organization. The endpoint server controls updates to the endpoint software installed in each endpoint within the network. As well as issuing endpoint updates, the endpoint server acts as an authentication server, authenticating connections into and within the network. What makes endpoint security solutions differ from the competition is that different vendors will include security software within their solutions. This will be software like a Host Intrusion Prevention System (HIPS), firewall, antivirus and antispyware to apply to certain attack vectors and to provide more security.

Over the years, malware has evolved, and endpoint solutions have leveled up to keep up with the constant threats. Security vendors have now embraced endpoint security as a service to manage new threats better.

How Has Endpoint Security Changed in Recent Years?

Over the years, endpoint security has evolved from primitive antiviruses to the more sophisticated next-generation antiviruses that employ advanced technology, the newer and better endpoint detection and response, and (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Lester Obbayi. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/qWqnjYhq3g4/