IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers. They can now be just about anything located anywhere, from employees’ homes to airports, hotels and in the cloud, and they may be devices owned by employees as a result of the bring your own device (BYOD) trend.
But every endpoint represents a potential entry point for cyber attackers, and needs to be managed because in many ways endpoint devices have effectively become the new corporate network perimeter, and consequently they are increasingly coming under attack.
The proliferation of endpoint devices beyond desktops, laptops, tablets, and servers to include things like cloud devices, IoT devices, phones, and Point of Sale systems, is making it increasingly difficult to manage all the endpoints that are connecting to corporate networks.
Endpoint security was a key theme at this year’s KuppingerCole Analysts’ Cybersecurity Leadership...
Subscribe to our Podcasts
How can we help you