Endpoint Security – Don’t get Caught Out!
Posted 26 June 2014 by Kelvin Papp
Endpoint Protection. It’s one of those things that’s too often overlooked in our industry – do you have it? Of course the answer is yes (of course, right?!), but what is it actually doing for you, and what criteria did you use in your product selection process?
I say overlooked, because the truth is that most organisations seem to flounder when it comes to identifying what it is that they want or more importantly need in an Endpoint Security product. I’ve seen countless deployments where organisations have seemingly picked a product at random, implemented it with near default settings, or are using a tiny proportion of the available functionality.
Given just some of the recent high profile outbreaks and attacks, this stance is no longer acceptable for many organisations – the real cost of threats like those posed by Gameover Zeus and CryptoLocker can be seen across multiple industries and sectors and is something which every IT department should be engaged in a proactive agenda against.
From my perspective, there are a number of key factors I encourage customers to consider when choosing a product:
- Reputation: How well regarded is the vendor and product – both by the industry and by its customer base? How well do they react to new threats and security challenges?
- Functionality: What components are included, and how closely do these align with the requirement? Does the product provide support for all the applications / operating systems you need to protect?
- Manageability: How easy is the product to configure and deploy and how much effort is required to maintain it moving forwards?
It’s fair to say that whilst Endpoint Security is a key component of the modern enterprise, it’s one which as a rule doesn’t receive the focus that it often deserves given the implications of not having it in place or configured properly.
One of the steps we’ve taken here at Blue Chip in an effort to remove the challenges associated with product selection and implementation, is to address some of these questions on behalf of our customers through our hosted Endpoint Security service. In partnership with Kaspersky, we offer this “as a service” – taking on board many of the common infrastructure challenges associated with ongoing maintenance of Endpoint Security and making it accessible to organisations on a simpler “per device, per month” basis. As a subscriber, you can have access to protection for a wide variety of platforms and in a way which you can be assured is aligned with vendor recommendations, and backed by solid technical support to provide you with the foundation for a safe and secure IT infrastructure.
From a personal standpoint, I’m always keen to stress the importance of adequate and well-maintained security. Whether it’s a basic antivirus engine, or a fully featured Endpoint Security suite you need to have the confidence that where there is a risk, you are covered in a way which is simple, efficient, and non-intrusive.
To find out more about the benefits of our hosted service, or to speak in more detail about your protection needs, contact us for more information.
Back to blogs