Out of all the activity in the cyber-security and cyber-crime areas, a lot of the focus seems to be on the endpoint – the approach to network protection that requires each computing device on a corporate network to comply with certain standards before access is granted. Endpoints can include PCs, laptops, smart phones, tablets and bar code readers or POS terminals. The term is evolving from simple personal firewalls to include intrusion detection with behavior-blocking components that monitor devices. The expertise for this type of protection must include forensic analysis, threat intelligence and adversary hunting.
A distributed denial of service (DDoS) is one type of attack that can cause bandwidth starvation. It's important to note that there are many other conditions that can also cause excessive network load. IT managers must be prepared. They need to change their long-term thinking and planning about resource usage, protecting devices on the network and protecting critical network bandwidth. This endpoint security model can help align this thinking to modern realities.
Since so many attacks emanate from a compromised or ill-intentioned employee, protecting the endpoint has become a focus of some of the smartest minds in the space. That’s a good thing, because the endpoint keeps getting more complicated with the proliferation of mobile devices.