Subscribe
About

Endpoint security a must

Staff Writer
By Staff Writer, ITWeb
Johannesburg, 09 Mar 2009

As professional hackers continue to develop new tactics, users need to evolve with them and be more vigilant and educated, says Tich Mugwara, Symantec enterprise security product specialist at Drive Control Corporation (DCC). This will thwart their best efforts while protecting valuable information assets.

Mugwara says anti-virus, anti-spyware, and other signature-based protection measures are not enough anymore, although they still play a role in protecting notebooks, desktops, and servers. “They are now part of a bigger picture and solution,” he says.

In order to effectively protect organisations' security endpoints against sophisticated threats, Mugwara advises companies to implement a proactive endpoint security strategy.

“The key is to partner with one security vendor that offers a comprehensive, multi-layered endpoint solution that mitigates challenges and risks while protecting your company,” Mugware adds.

Current offerings consolidating multiple endpoint protection technologies into a single integrated agent controlled from a unified management console, say Mugware, offer the best of both worlds. They combine strong anti-virus and anti-spyware signature-based protection with firewall, device control, and proactive intrusion prevention software. They also employ threat prevention to protect the organisation against known and unknown threats.

Importantly, he adds, these solutions fortify the organisation against sophisticated attacks that evade traditional security measures, such as rootkits, zero-day attacks, and mutating spyware. The solutions provide a deeper inspection into the file system, enabling the analysis and repair processes necessary to remove even highly difficult rootkit attacks.

Mugware stresses that endpoint security solutions, including firewalls, are critical to increase proactive and defensive security management. “Such solutions also reduce false positives, without the need to create rule-based configurations, and with a single agent and a centralised management it can also lower TCO,” he concludes.

Share