Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Endpoint is the Point

By Steve Hunt
October 4, 2006


Think for a minute about all the computers, laptops, servers, phones and PDAs humming and chirping around your campus. Employees and contractors are walking around, sitting in conference rooms and cubicles, and milling around data centers with these gizmos.

And nearly every one of them is connected to the company network in one way or another. Add those little memory sticks to the mix – you know, the thumb drives you shove into the USB ports on the computer to copy or backup files – and you have a world of security trouble on your hands.

Every one of those devices can knock a company right out of regulatory compliance, or slap the CEO onto the front page of the Wall Street Journal with some explosive loss of all your customers’ identity information. It’s time you took notice and did something about securing these "endpoints" to prevent information leakage.

Technology Options

Your network folks may already have deployed some security tools. Let’s look at what they might have out there.

Vulnerability Scanners detect network problems but cannot adequately assess how endpoints may be improperly used.

What they do.

Vulnerability scanners provide network-based scans of thousands of vulnerability sources. Nessus, the most popular freely downloadable network scanner can find thousands of known vulnerabilities and are most useful in large networks.

What they don’t do.

Vulnerability scanners do not provide active protection of devices, nor are they designed to respond to brand new exploits and alone cannot assess many vulnerabilities on PCs or other endpoints.

Auditing Tools collect local logs of events and compare events to policies.

What they do.

An audit tool will create a report of violations of policy on networks or PCs. They periodically scan the network for unusual traffic patterns or problems and probe for any weaknesses. NetIQ or Symantec Compliance Manager can check for weak passwords or improper rights given to system administrators and discover security related activities on PCs.

What they don’t do.

Audit tools do actively correct problems they discover or control behavior on a PC. They do not work without client software running on each device. Ugh.

Network Admission Control Systems offer limited inspections of basic security settings on PCs and devices connecting to the network.

What they do.

Known as NAC from Cisco or NAP from Microsoft (standing for Network Access Protection), these systems perform inspections of PCs as they connect to the network checking for current versions of antivirus and anti-spyware software and other security settings.

What they don’t do.

NAC inspections do not detect many threats related to information leakage.

Client Firewalls control network connections on a PC.

What they do.

Also known as personal firewalls, these software products monitor connections to and from the PC by Internet sites, software applications, and external devices. I use Check Point Software’s Zone Alarm but Symantec’s Sygate Enterprise Protection is also good. Consider going on the Internet to get colleague reviews of these products and others mentioned.

What they don’t do.

Client firewalls cannot prevent a user from disabling the firewall or changing security settings. They usually just protect against a few of the most common Internet threats.

Device Protection focuses on appropriate use of attached devices but largely ignore how applications are used.

What they do.

Products from SecureWave, Controlguard, Safend and others monitor and control use of memory sticks and some software applications and external connections.

What they don’t do.

Device protection software doesn’t prevent attacks from a device authorized by the system or by a connection not actively inhibited by the software.

Disk Encryption protects against losing information when a laptop or PDA is lost or stolen.

What they do.

Hundreds of people can attest to the feeling of satisfaction they had when, after recovering from the shock of losing a laptop, remembering that the hard drive was encrypted. Utimaco and PointSec do a good job of enterprise-wide hard drive encryption, but both lack a way of securing a document once it leaves the PC.

What they don’t do.

Disk encryption does not protect information once it leaves the computer as an email or when it is copied to a memory stick.

Nature of the Solution

The technology options to address all these threats can make your head spin. But in fact, there is a simple and affordable way to manage the problem. Promisec makes a software product that choreographs all of those security solutions listed above. Its Spectator Pro product watches all installed security products, like client firewalls, antivirus and information leakage products, fixing a variety of problems that naturally arise. Frequent scans of devices from the network reveal when security products are not doing their jobs. Maybe the client firewall is disabled, or perhaps the anti-spyware is not installed, or antivirus is out of date. Maybe a user of the machine attached a storage device and downloaded personal information of customers. Spectator Pro alerts security personnel and may automatically send signals to network access control systems, or antivirus servers, and so forth, to initiate either a quarantine of the non-compliant system or full repair and update of the machine.

When information leaves the safe confines of the company loaded onto a physical device, it’s your problem. Now you have an easy way to keep your boss (and yourself) out of trouble and your company’s information safe.

SIDEBAR
Build Redundancy Into Disaster Plans, Too

Whether you are protecting your computers and data from attack or staff from natural or man-made disasters, redundancy is the key, according to Susan Sparkes-Hoskins at Gunnar Manufacturing, Calgary, Canada.

Protection begins outside at the interface with the world around:

1. Landscaping designed to slow and allow for video monitoring and identification of those approaching the building including structures erected keeping cars from encroaching on the building.

2. Structural facades of buildings provide reinforced protection against terrorist attacks and provide greater strength against natural disasters.

3. Windows in buildings are either bullet resistant or treated with a protective coating to help contain glass fragmentation.

4. Security officers, electronic access control systems and even metal detectors positioned at all entrances.

AND THEN WHAT?

If the lines of defense to this point are breached, where do your employees turn to for safety? We have always been told, that in case of disaster to hide under a table or other strong structure in the hope of finding a void and having your life spared.

Now, we can take most of the luck out of the equation and ensure that you have your own purposeful void under your desk.

5. A safe and secure place to seek refuge in the event of a building collapse due to natural disaster or terrorist strike.

There are now on the market protective office furniture systems which reduce risk and enhance the probability of survival in the event of a building collapse due to natural disaster, criminal activity or terror attacks through several features contained in a unique, patented design. Such office suites are covered in a composite material that acts as a protective coating to hold the desk together so it does not become additional shrapnel and pose a danger to everyone around it.

Some even have a personal protection pod with a Kevlar coating. Such desks bolt to the concrete flooring so they don’t become projectiles.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Innovation Sets The Tone

    See More
  • Here Comes the Techs

    See More
  • The Heartland of Security Innovation

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!