Charles Leaver – Defining An Endpoint And Protecting It Will Increase In Difficulty As Connected Devices Rise

Written By Roark Pollock And Presented By Ziften CEO Charles Leaver


In the very recent past everyone understood exactly what you suggested if you raised the issue of an endpoint. If someone wanted to sell you an endpoint security product, you understood what devices that software was going to protect. However when I hear someone casually talk about endpoints today, The Princess Bride’s Inigo Montoya comes to mind: “You keep using that word. I don’t think it suggests exactly what you think it implies.” Today an endpoint could be nearly any type of device.

In truth, endpoints are so varied these days that people have actually taken to calling them “things.” According to Gartner at the close of 2016 there were greater than six billion “things” connected to the internet. The consulting company predicts that this number will grow to twenty one billion by the year 2020. The business utilization of these things will be both generic (e.g. connected light bulbs and Heating and Cooling systems) and market specific (e.g. oil well safety tracking). For IT and security groups responsible for linking and protecting endpoints, this is just half of the brand-new difficulty, nevertheless. The acceptance of virtualization innovation has actually redefined exactly what an endpoint is, even in environments in which these groups have generally run.

The previous ten years has actually seen an enormous change in the method end users access information. Physical devices continue to be more mobile with lots of info workers now doing the majority of their computing and communication on laptops and smart phones. More importantly, everybody is becoming an info employee. Today, better instrumentation and monitoring has permitted levels of data collection and analysis that can make the insertion of information technology into almost any task lucrative.

At the same time, more standard IT assets, especially servers, are becoming virtualized to remove some of the traditional constraints in actually having those assets tied to physical devices.

These 2 patterns together will impact security groups in important ways. The totality of “endpoints” will include billions of long-lived and unsecure IoT endpoints as well as billions of virtual endpoint instances that will be scaled up and down as needed as well as moved to various physical areas as needed.

Enterprises will have very different worries about these two general kinds of endpoints. Over their life times, IoT devices will have to be protected from a host of risks some of which have yet to be thought up. Tracking and protecting these devices will need advanced detection abilities. On the plus side, it will be possible to preserve distinct log data to enable forensic examination.

Virtual endpoints, on the other hand, provide their own crucial issues. The capability to move their physical location makes it far more hard to guarantee right security policies are constantly attached to the endpoint. The practice of reimaging virtual endpoints can make forensic examination tough, as important data is normally lost when a new image is applied.

So it is irrelevant what word or phrases are used to explain your endpoints – endpoint, systems, client device, user device, mobile phone, server, virtual machine, container, cloud workload, IoT device, and so on – it is important to comprehend exactly what someone indicates when they utilize the term endpoint.