Uploaded on Feb 8, 2023
PPT on Endpoint Security
What Is Endpoint Security?
INTRODUCTIO N Endpoint security forms part of a broader cybersecurity program that is essential for all businesses, regardless of size. It has evolved from traditional antivirus software to comprehensive protection from sophisticated malware and evolving zero-day threats. Source: www.kaspersky.com What is endpoint security? Endpoint security, or endpoint protection, refers to securing endpoints — such as desktops, laptops, and mobile devices — from cybersecurity threats. Source: www.kaspersky.com What is endpoint security cont. Endpoints can create entry points to organizational networks which cybercriminals can exploit. Endpoint security protects these entry points from malicious attacks. Source: www.kaspersky.com Why is endpoint security important? Businesses need to protect their data and ensure visibility into advanced cyber threats. But many small and mid-sized businesses lack the resources for continuous monitoring of network security and customer information and often only consider protecting their network once a breach has already taken place. Source: www.kaspersky.com How does endpoint security work? The terms endpoint protection, endpoint security, and endpoint protection platforms are often used interchangeably to refer to centrally managed security solutions organizations use to protect endpoints. Source: www.kaspersky.com On-location An on-location or on- premises approach involves a locally-hosted data center that acts as a hub for the management console. This will reach out to the endpoints via an agent to provide security. Source: www.kaspersky.com Cloud This approach enables administrators to monitor and manage endpoints through a centralized management console in the cloud, which devices connect to remotely. Source: www.kaspersky.com Hybrid A hybrid approach mixes both on-location and cloud solutions. This approach has increased in prevalence since the pandemic has led to increased remote working. Organizations have adapted their legacy architecture and adapted elements of it for the cloud to gain some cloud capabilities. Source: www.kaspersky.com What is considered an endpoint? A network endpoint is any device that connects to an organization’s network from outside its firewall. Examples of endpoint devices include: Laptops Tablets Desktop computers Mobile devices Internet of Things devices Wearables Digital printers Source: www.kaspersky.com THANK YOU
Comments