Endpoint security: From chaos to clarity

Share this article:
Endpoint security: From chaos to clarity
Endpoint security: From chaos to clarity
There's no doubt that IT security managers are busy keeping their organizations' networks secure. Last year, thousands of new viruses were released and spyware ran rampant. These challenges don't even consider the difficulty administrators have making sure all of their systems are configured properly and working in sync. All of this means that keeping endpoints secure requires having in place a healthy mix of such defensive technologies as anti-virus, anti-spyware, endpoint firewalls, SSL VPNs, among other applications.

One of the greatest challenges organizations face in maintaining security is managing security gear from all the many different security and network equipment providers. The reality is that these applications still are complex and don't interoperate well, working directly against security professionals, network equipment providers, security vendors, and system integrators.

For instance, security vendors, such as Symantec and Kaspersky Labs, need to know that their applications can interoperate with all of the leading network equipment providers, while end users need to know that the equipment they buy from multiple vendors can be integrated properly–not only to keep down operation costs but also to be sure that new solutions work properly with such security initiatives as network access control.

What's needed is every provider in the technology chain – the users, builders, and implementers–to know to a high level of certainty that the security applications they deploy can work together with their current infrastructure without requiring substantial, time-consuming integration efforts. 

There are many ways to try to achieve this – XML interoperability, third party testing labs and strategic vendor partnerships. For our efforts, we've turned to the open, industry-wide OESISOK* certification program. While OESISOK won't put an end to the current security integration challenges, it does go a long way toward providing the clear integration path necessary for the deployment of effective security technologies that will, finally, work together without too much patchwork.

*When a security application is designated OESISOK [www.oesisok.com], it is considered to be compatible with many network connectivity and other system health verification solutions. Before OPSWAT designates a security application OESISOK, the application must satisfy all criteria outlined in its respective document.
Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Opinions

Sign up to our newsletters

TOP COMMENTS

More in Opinions

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem ...

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?

CISO: same title, new opportunities

CISO: same title, new opportunities

Despite big responsibilities compounded by a string of headline-grabbing data breaches, the skies are looking brighter for CISOs.