Network Security 101 :: EndPoint Security :: What Why & How

Rohan Naggi
4 min readJul 14, 2021

What is Endpoint Security?

Before we dive into Endpoint security, let us define Endpoint. Any device connected to a network is an endpoint.

Endpoint security sits on individual devices such as laptops, desktops, phones, or even IoT devices (like Smartwatches, smart thermostats, printers etc..).

Common examples of endpoint security include OS firewalls, antivirus, anti-malware, and DLP.

What does Endpoint Security protect us against?

End Point security solutions protect both system integrity and user data. Centrally managed and benefitting from vast databases of known threats, a complete endpoint security solution helps an endpoint protect itself while preventing it from spreading problems.

You might be wondering why to protect IoT devices? For instance, Hackers might use these smart IoT devices (like a smartwatch) to get access to other devices on your network.

Is Antivirus good enough to protect endpoint devices?

Early days of endpoint security could mean installing Antivirus software on the devices like laptops, desktops, and servers. This is not sufficient in today’s digital transformation. Why?

End users are using BYOD and different types of devices types, the threat landscape has evolved a lot, Zero-day attacks are getting more prominent. This has lead to the expansion of Endpoint security offerings.

Endpoint has expanded from a single component of owning Antivirus to Antivirus + AntiMalware + Machine Learning + Web Security + integrated firewall + DLP and more.

Why is Endpoint Security Important?

Endpoint Security is central to preventing previously compromised devices from launching attacks inside the corporate environment while also protecting clean devices from infection. With the prevalence of personally owned bring-your-own devices (BYOD) and multi-use devices on corporate networks, endpoint protection can partition distinct contexts for differing use cases. This approach blocks the flow of information from one context to another, preventing a compromised consumer context from accessing proprietary information or infecting the corporate context.

How does Endpoint Security Work?

Depending on the endpoint, controls can be embedded in hardware (like a hardware chip on a laptop/desktop), integrated into the operating system (for example Microsoft defense), or deployed through the use of an agent. The policy is sent to this controller from a central manager that can report on compliance violations, apply required patches, block known-bad connections, and isolate compromised components. Advanced solutions provide capabilities to quarantine suspected zero-day attacks and other novel threats.

The following concepts are central to the construction of an effective endpoint security layer:

· Endpoint Protection Platform (EPP): An endpoint protection platform (EPP) is the central control point to deploy, manage, and operate endpoint security policy. An EPP can prevent security threats from both known and unknown forms of malware. It provides automation for operational tasks and raises the visibility of potential and ongoing threats. An EPP unifies operations of endpoint agents and distributed access controls. Modern EPPs are leveraging the power of the cloud to hold an ever-growing database of threat information. This frees endpoints of the bloat associated with local storage of all this information and the associated maintenance required to keep these databases up to date. Accessing this data in the cloud also allows for greater speed and scalability

  • Endpoint Detection and Remediation (EDR): Endpoint detection and remediation (EDR) has evolved beyond traditional antivirus programs to incorporate defenses against malware, ransomware, destructive activities, and newly emerging threats. It offers capabilities that can detect and respond to threats that an EPP and other security tools did not identify. These solutions operate independently of the corporate environment and can protect a device regardless of the nature of the connection or the vector of the attack (e.g., USB media, laptop, IoT devices, Servers, Wireless devices, medical devices). Network Detection and Remediation (NDR) offers similar functionality for networking, while Extended Detection and Response (XDR) is a SaaS-based security model and operates from endpoint to the cloud.
  • Device Assessment and Remediation: Real-time device assessment and remediation systems allow auditors to understand the current state of systems, investigate and analyze paths through which endpoints may have become compromised, and manage corrective efforts, including patching, encryption, and posture enhancement.
  • Application Control: Endpoint application control allows system administrators to define and limit valid update sources (e.g., users, groups, applications) to ensure only trusted updates can be deployed. Application control solutions can lock servers and other critical systems to prevent unwanted changes and ensure continuous compliance with regulatory mandates. App control can protect both new and legacy systems and is applicable to embedded, virtual, and physical platforms as well as operating systems.

--

--

Rohan Naggi
Rohan Naggi

Written by Rohan Naggi

Product Manager, Author, Podcaster, Man on Mission-Work Hard & Live the Best Life

No responses yet