Endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats.

Endpoint security is designed to secure each endpoint on the network created by these devices.

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

Endpoints can include PCs, laptops, smart phones, tablets and specialized equipment such as bar code readers or point of sale (POS) terminals.

Usually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices).  The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).

Endpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.

Reference: http://www.webopedia.com/TERM/E/endpoint_security.html

Products in the Endpoint Security Space: Gartner 2014




List of Products in the Endpoint Security Space: Reference: https://www.g2crowd.com/

  1. Symantec Endpoint Protection
  2. Malwarebytes
  3. Kaspersky Endpoint Security
  4. Avast Endpoint Protection
  5. Bit9 Security Platform
  6. McAfee Endpoint Protection
  7. Trend Micro Endpoint Security
  8. Sophos Endpoint Security



Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.