Controlling the access

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

INTRODUCTION:

End-Point Security

Security means controlling the access to networks and systems, the purpose of the access, the conditions of the access, and the tasks permitted by the access. Security includes protection from threats to property, safety, and privacy; as well as the management and mitigation of risks due to exposure to these threats. End point securityis the concept ofinformation securitywhich assumes that each device also called as end point is responsible for its own security, a critical topic that means different things to different organizations. Basically an endpoint can be an individual computer system or device that acts as a network client and serves as a workstation or personal computing device. Endpoints are often mobile and intermittently connected. Common endpoints are laptops, desktops, and personal computing devices such as connected PDAs. Also, an application server can be considered an endpoint when it functions as a network host End point security is a virtualization desktop to multiple networks subscriber by connecting virtual machines to maintain single desktop, central computer or a server. End point systems which connect to various networks or the devices like Memory cards,Mp3 players, Camera, External derives and so on and to transfer data. There are some of the storage devices for End Point that may be like laptops, desktops or servers. Depending upon the upcoming technology there is an increase in storage devices that relates to end point security. The size and the comfort level of those storage devices could increase from MB to GB and also TB storage devices, where they easily connect to any system and steal the information which is available, and make huge losses in that environment. End point encryption is unexplained about the protection of sensitive data, where it could maintain business continuity. Safety against threats through end point is like firewalls in the network gateway or scanning of Antivirus at central server. The main aim of end point security is protect it from threats and other losses. Threats to the endpoint security would contain, loss of information, unauthorised information access between the endpoints, etc. The overall growth in revenue of the security software market has touched $13.5 billion in 2008 as recorded to previous years. But in recent years in security software industry there was only about $11.5 billion in 2007. There shown some signs to decrease in software market bit continue to grow somewhat around 9% at the end of 2009 (Bhaskar H, 2009)

End Point Security in Business Perspective

There are many small as well large businesses, it could be profit or non profit, most of them would recommend the talents of employee. But it could contain multitudes of hats between them. The hard drive present in the server is known as heart of every business. Some of the IT equipment would consider like workstations and projections. They are responsible for their end point security, so each device is responsible to focus on client environment which goes through firewall, patches, security, antivirus etc. Large enterprises have malware outbreaks all the time (Grant G, 2009). So as to focus on these damages it would addressed to some of the IT teams. Even though looking at some business solutions after recent thefts that are found in security like data loss, physical damage, or Data theft, one can focus upon the physical security for IT domains when they would work with some company. There were no upcoming technologies to restrict the measures depending upon the data loss previously. Thinking of these security measures they have been investigated theft related to those are some of physical security solutions may pay off big cost in future. So depending upon different needs of the business in terms of security is to protect both the server and the data from central location. End point security is the typical architecture where it is conducts most of its business and break apart to the endpoint which would effect in cost and lots of productivity. Symantec Corporation is betting that enterprises will respond eagerly to two new services announced today to manage and monitor endpoint security (Neil R, 2009). As we can see some of the ongoing things that are coming to closer between end- point security and information protection, the overall trend between these mobility and remote access has focused upon the IT to readily reshape. This would rely upon the security solutions that would protect sensitive data which might be no longer competent. But the end- point security vendors are focusing on relevant data protection to maintain their position in the market. Threats to endpoints include viruses, Trojans, worms, Distributed-Denial-of-Service and spyware. Threats are evolving everyday by exploiting the weaknesses, the security devices like firewalls, Network Intrusion Detection systems provide good security until these devices can inspect and clean the traffic before it enters to the network. Due to the usage of device such as laptops and PDAs make architecture more complex, to secure the end-points to compose of all mobile devices and portable storage devices. Among then many corporate IT sectors attempts to secure their laptops with personal firewall and antivirus, but these are not that strong to keep with the malicious attacks that cause through internet. There are some of the weakest points in end point security to resolve the business needs or organisation. To Secure end devices against Trojan horses, malicious code injections, denial of service attacks and other cyber attacks while accessing from home or a public wireless networks

  • Installation and maintain the associated rules and policies.
  • Lack of ability to update the anti-virus.
  • Restrict users to access the organization's Network from unauthorized computers.

Key Benefits for end point security.

The BPM provides lots of benefit to organization such as, Increase the revenue, Reduce the operational cost, Eradication of Data Entry Errors, Critical Failure Avoidance, Higher Customer Satisfaction Levels (Joydeep C, 2009). To recover the data and system recovery vendor there are multiple layers to protect from market leading end point security, web, and data loss prevention and messaging security. The automatic control help to prove and enforce attachment to a formal agenda to IT policy and regulations. It simplifies creating and operations by quick deploy with relating disruption to the environment through easy optimizing the system resources. They have information backup and recovery tasks through central management for multiple desktops across entire organisation. Enable cost-effective bandwidth and infrastructure provision (white paper, 2007). They show through end users experience with single logon and single update. Network Admission Control (NAC) or Network Access Protection (NAP) is capable for built in remote access (system security services, 2009).

Endpoint Security to End User.

Nowadays, attacks are coming from heavy traffic like e-mails and trusted websites. The social sites like yahoo and orkut, e-market place like Amazon and eBay, advertising network of Google and yahoo are the main target to the hackers because of its broadcast reach of their malicious programs. They use multiple counter measures attacks and provide far superior protection to anti-virus only products. But threats facing consumers are more harmful and almost originate from internet. Email-based attacks on end users pose one of the greatest threats, once compromised; end-user systems not only expose local data to cybercriminals, but also can provide them with access to other, more sensitive systems on the same network (Core Security Technologies, 2010). Endpoint security could include malware, and also bugs in software. Even though the security professional would find it difficult whether a PC or a laptop may contain malware. Endpoint security provides stronger protection towards protecting data, and lowers operational costs, stops malware, spyware, exploits, spam, and attacks. Endpoint security also allows users to be accurate, verify, and enforce compliance with comprehensive policy and flexible network access control. As we go on towards Personal Firewall Management with the end users perspective which related to the security issues like personal firewall, it is software which has the data flow through computer and the internet. This is the area where user controls the process of data flow towards the internet. Personal firewall are on growing and important nowadays due to high bandwidth connections with is used as both home and public (via wireless hospects) (Horrigan, J., 2007). According to the high bandwidth there are huge amount of security and privacy risks to users. Users find it easy to download and run and share harmful software in which it could identify or record theft. It's the data flow between users and the internet which could imply privacy implications. According to those servers on the internet like browsing activity so to read the email messages, would allow the popup window from spyware because it is connecting to the other computer on the internet. But end users can alter these problems by using these firewalls effectively. It is nothing but sending and receiving data in an appropriate manner. There are some of the significant approaches to end user security according to management problems. It is a complementary activity to send and receiving emails, web browsing, and updating the software. So taking some of the issues or actions personally about the computer security which is use to identify or protect data from hackers, viruses, and threats. There are some of the end users computing devices.

  • Updates and patches about the software security should be done or apply regularly.
  • And also update computer device application such as; IM client, and other programs.
  • Should regularly check the system security availabilities are enabled on system.
  • Authentication is required for the configuration of computer devices such as passwords and so on.
  • It should send or transfer files to end to end computing devices.

End point security with respective to technology:

As we see businesses are grasping up their opportunities with upcoming new technologies. Some of the basic requirements are in particular with anti-virus, security issues, and giving backups to those issues. We can see 97% protecting their websites with a firewall and also they are filtering their incoming mails for spam in IT organisations, in that some of 95% are scanning their incoming email and viruses (Information security breaches survey, 2008). We can see there is a huge accomplishment between the organisations in relative to security risks and providing security to end point users. According to the technology in IT administrators going through a wide range of frustration that would continue towards variety of threats that must be prepared to implement various technologies to protect endpoint security on the network with strategic business outcome. There are some of the technologies such as high speed networks, end to end encryption which is been widely adopted in providing the security towards the network levels. Today, business comes across various availability towards the point products, gaining to solve problems at endpoint security. These would involve distribution of detecting threats, antivirus scanning which would integrate malicious activity. There are some technologies cannot address newly attacks through existing protocols, before that attack system they are released through signatures. There are some of the current business security challenges that can overcome in this technology.

Administration Challenges:

Depending upon the usage of the current technology which is demanded through IT administration is to protect the security level at the endpoint. So as to protect those endpoints on the network they are maintaining some flexible tools. As time passed on security perimeter stared protecting the organisations from relevant threats. But nowadays if we see onto some of the organisations standards is a starting security perimeter for that IT administration who deals with the common centre for all security. The demand for those technologies can result in different ways that can be hidden in external or internal threats.

So these technology would develop and continue to catch up those technology which is use to deploy the growth of endpoint security. It is time consuming to implement that technology for every endpoint which is frequently concern. But these organizations would provide better utilization of various security levels that technology can help in better way.

Implementation:

Many organisations do a hard work to implement a proper security measures for the huge organisation with thousands of users. But companies or organisations could understand the importance of endpoint security, this is associated with poor impact of productivity, IT complexity, and cost associated to implement them with security problems from multiple vendors at times. But client solutions can cause some fragmentation which would result in lack of integration which is difficult in responding to threats.

Effectiveness

A proper solution for security related issues must address to security landscapes which lead to blended threats. Though the endpoint causes IT administration to frustrate by the high end systems which boot up very slow. They can easily focus on different business objects, reduce technology costs. Those depend upon the endpoint security, if a malware is found they don't have effective solutions to work on it, thus loss of productivity.

There was a huge change in shifting towards the mobile devices which are recently enacted different threats and data breach where they are newly created by the IT organisation to safe guard the productivity and to protect information from data breach. Depending upon the high usage on these mobile computing, IT organisations has taken major steps in corporate policy other than some technology. They have both the strategies have strong handed in endpoint security.

The next generation security goals are very much common in the form of desktop level firewalls, antivirus software programs. Where the organisation must not depend on the end user IT policy where end user seems to be eliminate the requirement in which endpoint security should be more effective (white paper, 2007). Every organization uses their corporative firewalls to detect systems and to protect the networks from the endpoints. There are few levels of security where we can see advanced security technologies which are common in the form of desktop level firewalls, and some of the antivirus software where just needs to update. But organisation would not only relay on the end users to follow their IT policies or to apply some of the software which they cannot just leave out the overall requirement of the end user which is very effective. According to survey of 1,400 enterprises, it has shown that 60% of data breaches are operating within the firewall insiders such as employees, contractors, who access to sensitive data (Pete S., 2007). There was huge development towards the Symantec Endpoint for small business edition which is easy to use, but with respective to the enterprise level protection that optimizes system resources so that small business can get it very easily. As 30% of the Symantec test resulted no negative impact and towards the client side is more than 6% and other vendor's performance by 30% least on scenario (Symantec Corporation, 2009). The organisation needs to make easy access into the system at various parties according to who sit beside for the availability to provide protection. There are some devices outside which is intranet of the organisation can directly have the access upon the protection controls (devices are like mobile devices) but most of these devices would look over the corporate resources likely to have control over of the organisation will not offer those opportunity that would specify the technology which is been used.

Reference

  • Horrigan J. Wireless Internet Access; A Pew Internet & American Life Project Report, 2007. Available: http://www.pewinternet.org/Reports/2007/Wireless-Internet-Access.aspx [Data Accessed: 6 March 2010]
  • Bhaskar H. (2009). Global security software market grows 18.6%. Available: http://www.mydigitalfc.com/careers/global-security-software-market-grows-186-417[dat accessed: 9 march 2010].
  • Joydeep C. (2009).Application of IT for effective Business Process Management.Available: http://www.articlesbase.com/information-technology-articles/application-of-it-for-effective-business-process-management-967735.html [data accessed: 14 March 2010].
  • White Paper, 2007, Jericho Forum, Available at: https://www.opengroup.org/jericho/Business_Case_for_DP_v1.0.pdf [date Accessed: 4 March 2010].
  • Information security breaches survey, (2008) Princewaterhousecoopers, Available at: http://www.pwc.co.uk/eng/publications/berr_information_security_breaches_survey_2008.html [Date accessed: 1 March 2010].
  • Pete S. (2007). High profile data losses are forcing organisations to tackle culprits operating inside the firewall.. Available: http://www.information-age.com/channels/security-and-continuity/features/273326/the-inside-job.thtml. Last accessed 5March2010.
  • Grant G. (2009).Symantec offers endpoint protection management, monitoring services.Available: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1359937,00.html.[Data Accessed: 11th march 2010].
  • Hilton C., Staff W., (Jan8, 2010). CSI Computer Crime and Security Survey Shows Poor Security Awareness Training in Public and Private Sectors. Available: http://www.govtech.com/gt/736410. [Data Accessed: 16th .March 2010].
  • System security services. (2009).Endpoint Security Solutions.Available: http://www.sssus.com/endpointsecurity.html. [Data Accessed: 16th March 2009].
  • Symantec Corporation. (2009).Symantec Endpoint Protection.Available: http://eval.symantec.com/mktginfo/enterprise/articles/b-tolly_report.pdf. [Data Accessed: 17th March 2010].
  • Core Security Technologies. (2010).Penetration testing end users and end-user applications.Available: http://www.coresecurity.com/content/end-user-testing-pro. Last accessed: 20th March 2010.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.