Nobody agrees on what endpoint security means. We asked ourselves, “If an endpoint computer is truly secure, what would that mean?” Of course, the end objective is to protect the enterprise through securing the endpoints, so the answers needed to be in the context of the whole enterprise. We came up with four general qualities that such a computer would possess:
First, endpoint configuration is consistent and complies with a set of policies intended to protect the enterprise through the endpoints (Configuration Requirement).
Second, users have access to resources, both on the endpoint and in the enterprise or outside it, limited by a set of policies intended to protect the enterprise through the endpoints (Access Control Requirement).
Third, users can only access and install approved applications on the endpoints (Application Control Requirement).
Finally, the endpoint is protected against external compromise by viruses, worms, trojans, spyware, and so on (Endpoint Protection Requirement).
Even with these criteria, we found that vendors have a variety of ways to reach these goals.
Product: Safe Access
Verdict: Excellent, fully featured endpoint security solution.
Product: LANDesk Security Suite
Vendor: LANDesk Software
Verdict: Very flexible with many pre-written policies for all areas of endpoint security.