The Endpoint is the Battleground

The battle for security today is being fought on the endpoint.


The endpoint is the target. Endpoints are the systems that store your intellectual property and perform critical business tasks. Anything at the end of a wired or wireless network connection is an endpoint; be it a server, desktop, laptop, mobile device, or xed-function device such as a POS machine or kiosk. It can be physical or virtual, sitting under your desk or existing in some storage rack far away When cyber attacks are launched to take your data, steal your identity, or disrupt your business, their ultimate target is your endpoints. Whether it is dropping malicious code or accessing sensitive data, the activity is occurring on your systems.

The endpoint is the “new perimeter.” There was a time when business computers were all connected to a local network and the pathways to the Internet were few and well-defined. The idea of perimeter security made sense, similar to gated communities of houses with security personnel in the guardhouses.

In the modern world, with mobile computing, cloud computing, and virtual computing, you can access your confidential data from almost anywhere. When mobile users travel, their endpoints are not protected by their network security. There are no well-defined perimeters or places to put the guardhouses. Today, each endpoint is essentially its own perimeter. For this reason, network security is necessary, but it’s insufficient to protect you from cyber attacks.

The endpoint is vulnerable. The vast majority of organizations are using traditional security tools that are based on antivirus and an outdated “detect-it-and-stop-it” strategy. Traditional endpoint security tools were born in another era and only stop “nuisance malware,” not targeted attacks.

Many industry experts claim that if you have the proper endpoint security you can reduce your investment in network security. Proper endpoint security is the most critical piece of your security program.