Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Endpoint is the Point

By Steve Hunt
October 4, 2006


Think for a minute about all the computers, laptops, servers, phones and PDAs humming and chirping around your campus. Employees and contractors are walking around, sitting in conference rooms and cubicles, and milling around data centers with these gizmos.

And nearly every one of them is connected to the company network in one way or another. Add those little memory sticks to the mix – you know, the thumb drives you shove into the USB ports on the computer to copy or backup files – and you have a world of security trouble on your hands.

Every one of those devices can knock a company right out of regulatory compliance, or slap the CEO onto the front page of the Wall Street Journal with some explosive loss of all your customers’ identity information. It’s time you took notice and did something about securing these "endpoints" to prevent information leakage.

Technology Options

Your network folks may already have deployed some security tools. Let’s look at what they might have out there.

Vulnerability Scanners detect network problems but cannot adequately assess how endpoints may be improperly used.

What they do.

Vulnerability scanners provide network-based scans of thousands of vulnerability sources. Nessus, the most popular freely downloadable network scanner can find thousands of known vulnerabilities and are most useful in large networks.

What they don’t do.

Vulnerability scanners do not provide active protection of devices, nor are they designed to respond to brand new exploits and alone cannot assess many vulnerabilities on PCs or other endpoints.

Auditing Tools collect local logs of events and compare events to policies.

What they do.

An audit tool will create a report of violations of policy on networks or PCs. They periodically scan the network for unusual traffic patterns or problems and probe for any weaknesses. NetIQ or Symantec Compliance Manager can check for weak passwords or improper rights given to system administrators and discover security related activities on PCs.

What they don’t do.

Audit tools do actively correct problems they discover or control behavior on a PC. They do not work without client software running on each device. Ugh.

Network Admission Control Systems offer limited inspections of basic security settings on PCs and devices connecting to the network.

What they do.

Known as NAC from Cisco or NAP from Microsoft (standing for Network Access Protection), these systems perform inspections of PCs as they connect to the network checking for current versions of antivirus and anti-spyware software and other security settings.

What they don’t do.

NAC inspections do not detect many threats related to information leakage.

Client Firewalls control network connections on a PC.

What they do.

Also known as personal firewalls, these software products monitor connections to and from the PC by Internet sites, software applications, and external devices. I use Check Point Software’s Zone Alarm but Symantec’s Sygate Enterprise Protection is also good. Consider going on the Internet to get colleague reviews of these products and others mentioned.

What they don’t do.

Client firewalls cannot prevent a user from disabling the firewall or changing security settings. They usually just protect against a few of the most common Internet threats.

Device Protection focuses on appropriate use of attached devices but largely ignore how applications are used.

What they do.

Products from SecureWave, Controlguard, Safend and others monitor and control use of memory sticks and some software applications and external connections.

What they don’t do.

Device protection software doesn’t prevent attacks from a device authorized by the system or by a connection not actively inhibited by the software.

Disk Encryption protects against losing information when a laptop or PDA is lost or stolen.

What they do.

Hundreds of people can attest to the feeling of satisfaction they had when, after recovering from the shock of losing a laptop, remembering that the hard drive was encrypted. Utimaco and PointSec do a good job of enterprise-wide hard drive encryption, but both lack a way of securing a document once it leaves the PC.

What they don’t do.

Disk encryption does not protect information once it leaves the computer as an email or when it is copied to a memory stick.

Nature of the Solution

The technology options to address all these threats can make your head spin. But in fact, there is a simple and affordable way to manage the problem. Promisec makes a software product that choreographs all of those security solutions listed above. Its Spectator Pro product watches all installed security products, like client firewalls, antivirus and information leakage products, fixing a variety of problems that naturally arise. Frequent scans of devices from the network reveal when security products are not doing their jobs. Maybe the client firewall is disabled, or perhaps the anti-spyware is not installed, or antivirus is out of date. Maybe a user of the machine attached a storage device and downloaded personal information of customers. Spectator Pro alerts security personnel and may automatically send signals to network access control systems, or antivirus servers, and so forth, to initiate either a quarantine of the non-compliant system or full repair and update of the machine.

When information leaves the safe confines of the company loaded onto a physical device, it’s your problem. Now you have an easy way to keep your boss (and yourself) out of trouble and your company’s information safe.

SIDEBAR
Build Redundancy Into Disaster Plans, Too

Whether you are protecting your computers and data from attack or staff from natural or man-made disasters, redundancy is the key, according to Susan Sparkes-Hoskins at Gunnar Manufacturing, Calgary, Canada.

Protection begins outside at the interface with the world around:

1. Landscaping designed to slow and allow for video monitoring and identification of those approaching the building including structures erected keeping cars from encroaching on the building.

2. Structural facades of buildings provide reinforced protection against terrorist attacks and provide greater strength against natural disasters.

3. Windows in buildings are either bullet resistant or treated with a protective coating to help contain glass fragmentation.

4. Security officers, electronic access control systems and even metal detectors positioned at all entrances.

AND THEN WHAT?

If the lines of defense to this point are breached, where do your employees turn to for safety? We have always been told, that in case of disaster to hide under a table or other strong structure in the hope of finding a void and having your life spared.

Now, we can take most of the luck out of the equation and ensure that you have your own purposeful void under your desk.

5. A safe and secure place to seek refuge in the event of a building collapse due to natural disaster or terrorist strike.

There are now on the market protective office furniture systems which reduce risk and enhance the probability of survival in the event of a building collapse due to natural disaster, criminal activity or terror attacks through several features contained in a unique, patented design. Such office suites are covered in a composite material that acts as a protective coating to hold the desk together so it does not become additional shrapnel and pose a danger to everyone around it.

Some even have a personal protection pod with a Kevlar coating. Such desks bolt to the concrete flooring so they don’t become projectiles.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • VPN

    Survey reveals inadequate security is the number one VPN pain point

    See More
  • endpoint-sec-freepik1170.jpg

    Sustainable cybersecurity starts with protecting both sides of the entry point

    See More
  • Innovation Sets The Tone

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • databasehacker

    The Database Hacker's Handboo

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing