Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Best of 2006: Endpoint security

Nobody agrees on what endpoint security means. We asked ourselves, "If an endpoint computer is truly secure, what would that mean?" Of course, the end objective is to protect the enterprise through securing the endpoints, so the answers needed to be in the context of the whole enterprise. We came up with four general qualities that such a computer would possess:

First, endpoint configuration is consistent and complies with a set of policies intended to protect the enterprise through the endpoints (Configuration Requirement).

Second, users have access to resources, both on the endpoint and in the enterprise or outside it, limited by a set of policies intended to protect the enterprise through the endpoints (Access Control Requirement).

Third, users can only access and install approved applications on the endpoints (Application Control Requirement).

Finally, the endpoint is protected against external compromise by viruses, worms, trojans, spyware, and so on (Endpoint Protection Requirement).

Even with these criteria, we found that vendors have a variety of ways to reach these goals.

BEST BUY
Product:
Safe Access 
Vendor: StillSecure 
Verdict: Excellent, fully featured endpoint security solution. 
Website: www.stillsecure.com 

RECOMMENDED
Product:
LANDesk Security Suite 
Vendor: LANDesk Software  
Verdict: Very flexible with many pre-written policies for all areas of endpoint security.
Website: www.landesk.com 

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.