iTnews
  • Home
  • Videos
  • Partner Content
Partner Content

Endpoint security strategies require a diverse approach risk-based approach

By Staff Writer
May 14 2024 8:03AM

Diverse Endpoints, Unified Defence: Crafting Effective Security Strategies.

With security researchers across the world suggesting at least two-thirds of all cyber-attacks are initiated through compromised endpoints, it is critical develop a strategy that protects each different type of endpoint with appropriate controls. But that can be challenging in a world where there are mobile devices such as smartphones and tablets that require different controls to laptops used in the field or PCs inside the corporate network.


Creating an endpoint security strategy that caters for these diverse use-cases requires an orderly approach. Michael Covington, the Vice President for Portfolio Strategy at Jamf says there are three critical elements to consider when formulating your endpoint security strategy.

“The three key elements of an endpoint security strategy are understanding your core requirements and the threat landscape, making sure that you have very clear understanding of the device types and platforms that you're going to be protecting and catering for the operational aspects that sit adjacent to the solution you deploy.”

Underpinning that, ranking the risks that you're most concerned about must be considered when evaluating the solutions that plan to acquire. By focussing solution efficacy, organisations can maintain a defence in depth strategy without being distracted by device diversity.

Covington says the focus in strategy formulation is often centred on the feature list. But when strategy development moves into the real world of execution there can be challenges. Not enough time is put into planning and how to manage a device securely through its entire lifecycle. Many organisations don't consider all the connective tissue in a project.

“Many organisations struggle with usability. They plan the absolute best solution from a feature perspective, but they don't always think about the impact on their end users or on operational staff to oversee that solution and deployment,” he explains.

Like any significant project, finding a starting point can be the hardest part. Covington offers this advice.

“The best place to start formulating your endpoint security strategy is to read up on the current threat landscape and linking that to the types of risks your workers are likely to encounter. For so long now we've looked at device management, endpoint security and remote access as different areas that require different strategies. We're operating in an integrated world where each one of those capabilities feeds the other. If you plan your strategies accordingly, you can get a real benefit by bringing these tools together when you're formulating your strategies in these different areas.”

Read the full State of Security Report Here:

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
endpointjamfpartner contentstate of security

Related Articles

  • LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing
  • AI is a force multiplier in the fight against cybercriminals AI is a force multiplier in the fight against cybercriminals
  • Securing your identity in the clouds Securing your identity in the clouds
  • IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

Partner Content

Securing the Future: Identity Takes Centre Stage in Business Operations
Partner Content Securing the Future: Identity Takes Centre Stage in Business Operations
Cloud Covered
Cloud Covered
State of Security 2024
State of Security 2024
Endpoint security strategies require a diverse approach risk-based approach
Partner Content Endpoint security strategies require a diverse approach risk-based approach

Sponsored Whitepapers

Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Trust Imperative 4.0
Trust Imperative 4.0
Centralized Remote Connectivity for State & Local Government
Centralized Remote Connectivity for State & Local Government
Global Employee Experience Trends Report
Global Employee Experience Trends Report
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

AI is a force multiplier in the fight against cybercriminals

AI is a force multiplier in the fight against cybercriminals

SASE can reduce vendor sprawl, minimise costs and enhance network security

SASE can reduce vendor sprawl, minimise costs and enhance network security

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

Digital Nation

More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
State of Security 2023
State of Security 2023
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.