Endpoint security is the organizational process to secure network endpoints, e.g., end-user devices such as desktops, laptops, and mobile devices, and other hardware such as Internet-of-Things (IoT) devices. Endpoints serve as points of access to an enterprise network and create points of entry that malicious actors can exploit.
Endpoint security software uses encryption and application control, network segmentation and other techniques to secure devices accessing the enterprise network, thereby better controlling security on those avenues of access to monitor and block risky activities. Encrypting data at endpoints and on removable storage devices helps to protect against data leaks and loss. Application control processes prevent endpoint users, whether authorized or not, from executing unauthorized applications that could create vulnerabilities in the network.
Our Guide to Risk Domains introduces and defines other critical and current risk domains – download here.