Securing the end point

An expanding estate of end point devices is making security maintenance an increasingly difficult task

Tags: ESETIDC Middle East and AfricaMcAfee IncorporationSymantec Corporationhelp AG (
  • E-Mail
Securing the end point Keeping a diverse range of end points secure is a challenge for IT departments, but more capabilites are being added to the security toolkit.
More pics ›
By  Keri Allan Published  January 9, 2014

An expanding estate of end point devices, across a range of different operating systems and platforms, particularly with enterprise applications and data becoming mobile, is making maintaining security an increasingly difficult task. Security vendors however, are bringing more capabilities to end point solutions to fight the war on hackers.

With some of today’s biggest security threats coming in the form of cyber crime, businesses of all sizes need to be aware of the dangers and make sure their entire business is secure. Financial institutions, along with insurance and real estate, are the second most targeted sector according to the Internet Security Threat Report (ISTR), receiving 19% of all attacks in 2012, but SMEs shouldn’t be complacent as the same report noted that small businesses were the target of 31% of all attacks worldwide that year.

But across all organisations it appears that consistently weak areas in the business are end points. Vendors are responding to this by educating organisations on the risks and providing ever-evolving end point security solutions.

“In the past few years we have seen new challenges including the massive shift from desktops to laptops, which added the pressure on data loss/leakage prevention security projects, with more demands such as full HDD encryption and mobile data protection,” notes Jalal Al-Bokhary, central territory manager — Saudi Arabia, McAfee.

Then, of course, there has been the rise of BYOD.

“With the increase in mobility and a mobile workforce, it is even more important for users to be aware of the dangers,” notes Bulent Teksoz, chief security strategist, Symantec. “As employees take advantage of mobility for work, especially in a BYOD environment, they are combining business and personal use on a single device, meaning a breach on a personal account can put business information in jeopardy as well.

“Currently, according to the 2013 Norton Report, half of smartphone users in the UAE have experienced mobile cyber crime in the past 12 months and 56% of mobile device users are not aware that security solutions for mobile devices exist. With 55% of working adults in the UAE using their personal mobile device for both work and play, it is increasingly important for businesses to educate users and ensure that endpoints are protected,” he notes.

Throw in the fact that some users are also shifting to virtualised environments and you can see another issue vendors have faced — a need to support and secure a wider variety of operating systems. But they have risen to the challenge with end point security solutions becoming far more sophisticated, with integrated encryption solutions and even data loss prevention modules.

“They have expanded far beyond just having updated malware signature files to incorporate features such as white listing or even behavioural patterns,” notes Megha Kumar, research manager, Software, at IDC MEA.

ESET’s channel marketing manager Elham Alizadeh runs through some of the aspects of the company’s end point security solutions: “Since mobile endpoints are now being used for business purposes — beyond just accessing emails — we provide mobile security solutions for the major smartphone platforms today,” she says. “These solutions safeguard smartphones and tablets from incoming threats with features such as antivirus and antispyware.

“Since data can also be leaked when the device is lost, the anti-theft feature is also a vital part of this solution. This built-in feature tracks missing devices and lets the admin stay in control of sensitive data. Through a single SMS command, it’s possible to remove all sensitive information including contacts, messages and memory card data. Furthermore, if an unauthorised SIM card is inserted in the smartphone, a message containing the card’s phone number, IMSI, and IMEI will be sent to a predefined number.”

Most of the players on the market are now working hard to become better at handling advanced persistent threats and advanced malware, as solutions for such types of malware have traditionally been on the network side, but we’re seeing more of this making its way to the end point.

“Looking at the more classic advanced persistent threats and malware, there is no doubt that the vendors have their eyes set on the end point and I think we will start to see them release end point clients in the near future or possibly, integrate closer with the vendors that are already well set in this domain,” notes Nicolai Solling, director of Technology Services at Help AG.

Then as well as providing vulnerability management tools, network access control and SSL solutions, vendors are also looking into new and improved ways to beat zero day and unknown threats. Symantec, for example, is doing this through a white listing service, where all new files seen across the world by its tracking systems are analysed and scored against a malware classification and blocked or approved accordingly.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code