Ready to Start Your Career?
January 17, 2017
Network Security vs. Endpoint Security is the Boxing Match of the Year: Who Wins?
January 17, 2017
January 17, 2017
327 new threats every minute. More than 5 every second. That’s the state of the world’s threat landscape according to Avecto.As you can probably guess, the challenge for organizations and their dedicated cyber security teams lies within the sheer volume of threats and being able to keep up with those threats.According to the Ponemon Cost of Malware Containment report, “16,937 alerts are created per week on average, but just 705 are investigated.”That means 16,232 are forgotten about. Weekly.Many professionals have argued if the best approach lies in Network Security, while others praise the benefits of Endpoint Security. So which is better?Network security is protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system. An example of network security is an anti-virus system.Endpoint security is the process of securing the various endpoints on a network, often defined as end-user devices such as mobile devices, laptops, and desktop PCs; endpoint security addresses the risks presented by devices connecting to an enterprise network.“Where network-based security solutions are strong is in their ability to provide you with a wealth of information about the network traffic and threats blocked. The side effect of this is the amount of noise generated by potentially thousands of warnings. This can lead to false alarms, large management overheads or live attacks being missed,” says Avecto.Of those threats that are investigated, deep analysis takes time, which can mean network-based solutions can prove restrictive to users, making it hard to balance security and user experience.From the perspective of Digital Guardian, “what differentiates endpoint security from the well-known anti-virus software is that within the endpoint security framework, endpoints bear some or all responsibility for their own security. This is in contrast to network security, in which security measures encompass the network as a whole rather than individual devices and servers.”While it seems from my research that Endpoint Security is the champion in this fight, what organizations really should focus on is an integration of both aspects. However, not an easy feat but critical nonetheless in protecting sensitive data.“By integrating network and endpoint security, organizations are afforded greater visibility over the entire range of security threats that they face, both in real time and for historical analysis. Security events seen on hosts and endpoints can be fed back into network security controls, allowing more accurate decisions to be taken and more proactive protection applied across all resources based on the context of the threat seen,” suggests Bloor Research.In order to move towards successful implementation of endpoint security practices, you must understand the various aspects and requirements.To hit you with a further vocabulary lesson, two components of an endpoint security solution are endpoint encryption and application control. Endpoint encryption fully encrypts your enterprise data on endpoints, including laptops, mobile devices, and other endpoints.Application control prevents the execution of unauthorized applications on endpoints and solves the challenge of employees downloading unauthorized or dangerous applications on mobile devices.IBM recommends in conjunction with these components, three more that they consider ‘critical.’ Those are:
- Multilayered endpoint defense
- Low operational impact
- Dynamic intelligence
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry