Endpoint security: From chaos to clarity

There's no doubt that IT security managers are busy keeping their organizations' networks secure. Last year, thousands of new viruses were released and spyware ran rampant. These challenges don't even consider the difficulty administrators have making sure all of their systems are configured properly and working in sync. All of this means that keeping endpoints secure requires having in place a healthy mix of such defensive technologies as anti-virus, anti-spyware, endpoint firewalls, SSL VPNs, among other applications.

One of the greatest challenges organizations face in maintaining security is managing security gear from all the many different security and network equipment providers. The reality is that these applications still are complex and don't interoperate well, working directly against security professionals, network equipment providers, security vendors, and system integrators.

For instance, security vendors, such as Symantec and Kaspersky Labs, need to know that their applications can interoperate with all of the leading network equipment providers, while end users need to know that the equipment they buy from multiple vendors can be integrated properly–not only to keep down operation costs but also to be sure that new solutions work properly with such security initiatives as network access control.

What's needed is every provider in the technology chain – the users, builders, and implementers–to know to a high level of certainty that the security applications they deploy can work together with their current infrastructure without requiring substantial, time-consuming integration efforts. 

There are many ways to try to achieve this – XML interoperability, third party testing labs and strategic vendor partnerships. For our efforts, we've turned to the open, industry-wide OESISOK* certification program. While OESISOK won't put an end to the current security integration challenges, it does go a long way toward providing the clear integration path necessary for the deployment of effective security technologies that will, finally, work together without too much patchwork.

*When a security application is designated OESISOK [], it is considered to be compatible with many network connectivity and other system health verification solutions. Before OPSWAT designates a security application OESISOK, the application must satisfy all criteria outlined in its respective document.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.