Talk With an Expert

Endpoint Security Justification and Establishment

Endpoint Security Justification and Establishment (PDF, 3.54MB)Published: 18 Jan, 2005
Created by:
Samuel Ho

As the information security officer at a prominent utilities organization, I witnessed first hand the pitfalls of providing network security only at the network perimeter, the false sense of security, and the potential monetary, regulatory and credibility consequences this traditional solution provides. After discovering the problem to be a prevalent one, and concluding that the situation would not go away, persuaded the CIO, IT management, and IT department representatives to allow me to research and provide a tactical and strategic solution. The goal of my 2 months research was to find the right solution to the problem. The industry terminology of the solution is called Endpoint Security. Endpoint Security extends the traditional security perimeter to network's edge device or end users device. End user devices are most commonly the workstations and laptops used to access a corporate network. Utilizing endpoint security vendor analysis and product evaluations, insightful presentations and communications with the CIO and IT management, I was able to obtain funding for this solution and pilot test with minimal user impact.