TrendAs attention is paid to end-point security, IT security sector grows

Published 5 January 2006

As the work force becomes a mobile work force, relying on remote wireless communication and teleworking, end-point security becomes even more of an issue, and the end-point security is the fastest growing IT security sector

A chain is only as strong as its weakest link. It is the same with security at the enterprise: All the fancy system and intricate procedures mean little if the endpoints are not secure. The development and execution of an end-point security strategy is thus an increasingly important and urgent issue for businesses of all sizes. End-point security strategy, however, is becoming more difficult to devise and implement because more and more businesses — and government organizations — try to implement flexible working practices and organizational models which emphasize wireless mobility, remote access, home working, flexible hours, and more.

So here is the paradox: On the one hand there is a growing recognition of the urgent need for end-point security because end-points are the weakest links in the security chain. On the other hand, contemporary technology, work practices, and organizational models which emphasize mobility, remote wireless connectivity, and teleworking militate against an effective and consistent end-point security strategy.

We know that multiple layers of network-centric, gateway security solutions are necessary to the integrity of any modern business. On their own, however, they do not provide enterprise-wide security in the current distributed, flexible enterprise. The main reason is that measures which may be sufficient in a static network environment are inappropriate for executing differentiated policies which are more suitable for the variable mix of risks and operational requirements of multiple users groups.

If network-centric technologies cannot deliver the required security, then end-point security strategy for large organizations must be found in client-based technologies. Only a client-based technology can exercise any kind of control and protection when a user is outside of the organizational security umbrella but to fulfill this role this client-based technology must meet several demanding conditions. The technology:

Can be defined, deployed, monitored, and controlled only from its central management console

Cannot be disabled or modified by an outside attacker or by a user

Can deliver automatic zero hour self-defense against new, unknown viruses and targeted attacks

Can be configured easily to execute appropriate policies which reflect the risks and operational requirements of each and every user group

Can recognize and block dangerous and unproductive usage

Can protect against information theft both through an outside attack and by users themselves

Can scale to manage thousands of users across multiple sites

This is a very demanding list of requirements. Little wonder, then, that endpoint security (beyond anti-virus) is the fastest growing recognized space in the IT security field.

-read more in Paul Henry’s ITObserver article