Uploaded on Feb 8, 2023
PPT on Endpoint Security
What Is Endpoint Security?
INTRODUCTIO
N
Endpoint security forms part
of a broader cybersecurity
program that is essential for
all businesses, regardless of
size. It has evolved from
traditional antivirus software
to comprehensive protection
from sophisticated malware
and evolving zero-day
threats.
Source: www.kaspersky.com
What is
endpoint
security?
Endpoint security, or
endpoint protection, refers to
securing endpoints — such
as desktops, laptops, and
mobile devices — from
cybersecurity threats.
Source: www.kaspersky.com
What is
endpoint
security cont.
Endpoints can create entry
points to organizational
networks which
cybercriminals can exploit.
Endpoint security protects
these entry points from
malicious attacks.
Source: www.kaspersky.com
Why is
endpoint
security
important?
Businesses need to protect
their data and ensure
visibility into advanced cyber
threats. But many small and
mid-sized businesses lack
the resources for continuous
monitoring of network
security and customer
information and often only
consider protecting their
network once a breach has
already taken place.
Source: www.kaspersky.com
How does
endpoint
security work?
The terms endpoint
protection, endpoint security,
and endpoint protection
platforms are often used
interchangeably to refer to
centrally managed security
solutions organizations use
to protect endpoints.
Source: www.kaspersky.com
On-location
An on-location or on-
premises approach involves
a locally-hosted data center
that acts as a hub for the
management console. This
will reach out to the
endpoints via an agent to
provide security.
Source: www.kaspersky.com
Cloud
This approach enables
administrators to monitor
and manage endpoints
through a centralized
management console in the
cloud, which devices connect
to remotely.
Source: www.kaspersky.com
Hybrid
A hybrid approach mixes
both on-location and cloud
solutions. This approach has
increased in prevalence since
the pandemic has led to
increased remote working.
Organizations have adapted
their legacy architecture and
adapted elements of it for
the cloud to gain some cloud
capabilities.
Source: www.kaspersky.com
What is
considered an
endpoint?
A network endpoint is any device
that connects to an organization’s
network from outside its firewall.
Examples of endpoint devices
include:
Laptops
Tablets
Desktop computers
Mobile devices
Internet of Things devices
Wearables
Digital printers
Source: www.kaspersky.com
THANK YOU
Comments