Endpoint protection, also known as endpoint security, protects computer networks connected to clients such as laptops, tablets, mobile phones and Internet of Things (IoT) devices, as well as servers or workstations, against cyber attacks. The practice or discipline of endpoint protection involves managing and controlling exposure to all possible endpoints that outsiders may have access to and restricting them from any IT resources, both on-premises and in the cloud.
Comprehensive Endpoint Protection Platforms (EPP), managed centrally and deployed on endpoint devices, prevent, detect and block malicious activity from both trusted and untrusted applications, and provide the analysis and remediation capabilities needed to respond in real-time to security incidents and alerts, according to technology analyst firm Gartner. EPPs also include data protection capabilities such as disk and file encryption, data loss prevention, and device control for comprehensive endpoint protection.
A recent Ponemon Institute survey found that nearly two-thirds (64 percent) of respondents reported that their company experienced one or more endpoint attacks that successfully compromised data assets and/or IT infrastructure over 12 months. In addition, costs due to the loss of IT and end-user productivity, and theft of information assets, have increased with an average cost per compromised endpoint at $440 while small-and-medium-sized (SMB) companies experienced a higher cost at $763 per endpoint.
Because modern security perimeters are continually in flux with a wide variety of devices and services requesting network resource access, both on-premises and in the cloud, the number of new endpoints is expanding organizational attack surfaces. Therefore, the need for visibility and control using endpoint protection is critical for organizations to maintain their security postures and regulatory compliance.
Endpoint Protection Services
Endpoint protection platforms and services range from on-premises and hybrid configurations to cloud-native endpoint security solutions. Modern endpoint protection platforms protect not only traditional corporate network architectures but also mobile endpoint devices, and may use artificial intelligence (AI) to optimize endpoint security decisions. In some use cases, cloud-based endpoint protection platforms can simplify protecting, detecting and responding to advanced threats targeting endpoints.
Key attributes of endpoint protection systems include device protection with antivirus and malware security for desktops, laptops and mobile devices such as phones and tablets. Additional features may include network controls that filter incoming traffic to identify security risks; application server controls to monitor and limit endpoint access; data controls to prevent data leaks and provide sensitive data encryption; and finally, web browser protection that blocks or allows access to specific websites when connected to a network.
Endpoint protection platforms also provide endpoint encryption to minimize data leaks and breaches, and forensic analysis tools to analyze known network issues and Internet of Things (IoT) for organizations that use internet-connected devices. Additionally, endpoint protection can encompass email gateways that block phishing emails and suspicious messages and quarantine protection for at-risk systems or databases.
Technical Framework Endpoint Protection Service
Technical Framework offers comprehensive endpoint security and protection management service that includes protection against all attack lifecycle phases: attack prevention against malware, zero-day exploits and network security, intrusion and data breach prevention, and response and remediation services.
Using the latest endpoint protection platforms and solutions from major IT security providers, Technical Framework implements and maintains best-in-class endpoint protection solutions to help clients ensure their IT security and regulatory compliance.