4 MANAGING ENDPOINT DEVICES
If you’ve walked the floor of any information security trade show, or perhaps caught the occasional subject line in a vendor’s email campaign within the last few years, you’ve probably seen several plays on the theme ‘the endpoint is the new perimeter’. The aim of this messaging is to suggest that, owing to trends such as a greater acceptance of remote working, the gig economy (i.e. use of contractors and freelancers), increased cloud adoption and more widespread mobile or personal device use, simply monitoring the traditional network perimeter with things like firewalls and IDS/IPSs doesn’t cut it anymore. Instead, the focus should be on securing the endpoint device the employee is using to access enterprise ...
Get Security Operations in Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.