Jump to content

Endpoint security: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Undid revision 792640697 by Mandyofish1E (talk) not "See also", COI spam
No edit summary
Line 5: Line 5:


===Client and server model===
===Client and server model===
Endpoint security systems operate on a [[client–server model]] with the security program controlled by a centrally [[Dedicated hosting service|managed host server]] pinned{{clarify|date=February 2016}} with a client program which is installed on all the network drives.<ref>{{cite web| url=https://technet.microsoft.com/en-us/network/jj991833.aspx |title= Centrally managed host server |publisher=Microsoft |date=2015-10-07}}</ref><ref>{{cite web| url= http://www.exforsys.com/tutorials/client-server/client-server-security.html|title=Client-server security |publisher=Exforsys}}</ref> There is yet another model called the [[Software as a service|software-as-a-service]] (SaaS), the security programs and the host server are maintained remotely by the merchant. In the [[payment card]] industry, the contribution from both the delivery models is that the server program verifies and authenticates the user login credentials and performs a device scan to check if it complies with a designated [[corporate security]] standards prior to permit network access.<ref>{{cite web |url=https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf |title=PCI and Data Security Standard|date=2015-10-07| format=pdf}}</ref>
Endpoint security systems operate on a [[client–server model]] with the security program controlled by a centrally [[Dedicated hosting service|managed host server]] pinned{{clarify|date=February 2016}} with a client program which is installed on all the network drives.<ref>{{cite web| url=https://technet.microsoft.com/en-us/network/jj991833.aspx |title= Centrally managed host server |publisher=Microsoft |date=2015-10-07}}</ref><ref>{{cite web| url= http://www.exforsys.com/tutorials/client-server/client-server-security.html|title=Client-server security |publisher=Exforsys}}</ref> There is yet another model called the [[Software as a service|software-as-a-service]] (SaaS), the security programs and the host server are maintained remotely by the merchant. In the [[payment card]] industry, the contribution from both the delivery models is that the server program verifies and authenticates the user login credentials and performs a device scan to check if it complies with a designated [[corporate security]] standards prior to permit network access.<ref>{{Cite web|url=https://check-caller.net/guide/why-is-mobile-security-important|title=mobile devices especially vulnerable|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|access-date=}}</ref><ref>{{cite web |url=https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf |title=PCI and Data Security Standard|date=2015-10-07| format=pdf}}</ref>
{{expand section|date=October 2015}}
{{expand section|date=October 2015}}



Revision as of 01:59, 18 July 2018

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones and other wireless devices to corporate networks creates attack paths for security threats.[1][2] Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.[3]

Corporate network security

Endpoint security management is a software approach which helps to identify and manage the users' computers access over a corporate network.[4] This allows the network administrator to restrict certain website access to specific users in order to maintain and comply with the organization's policies and standards. The components involved in aligning the endpoint security management systems include a Virtual private network (VPN) client, an operating system and an updated antivirus software.[5] Computer devices that are not in compliance with the organization's policy are provisioned with limited access, to a virtual LAN.[6]

Client and server model

Endpoint security systems operate on a client–server model with the security program controlled by a centrally managed host server pinned[clarification needed] with a client program which is installed on all the network drives.[7][8] There is yet another model called the software-as-a-service (SaaS), the security programs and the host server are maintained remotely by the merchant. In the payment card industry, the contribution from both the delivery models is that the server program verifies and authenticates the user login credentials and performs a device scan to check if it complies with a designated corporate security standards prior to permit network access.[9][10]

See also

References

  1. ^ "Endpoint security management overview". Retrieved 2015-07-22.
  2. ^ "What is endpoint security and how does it work". Retrieved 2015-08-21.
  3. ^ "What is endpoint security?". Retrieved 2015-07-22.
  4. ^ "Endpoint security & network protection". Retrieved 2015-10-07.
  5. ^ "Endpoint security standard". 2015-10-07.
  6. ^ Endpoint security and compliance management design guide. Redbooks. 2015-10-07.
  7. ^ "Centrally managed host server". Microsoft. 2015-10-07.
  8. ^ "Client-server security". Exforsys.
  9. ^ "mobile devices especially vulnerable". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  10. ^ "PCI and Data Security Standard" (pdf). 2015-10-07.