Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Endpoint security renaissance in the era of hybrid work

A few decades ago, corporate endpoints consisted mainly of stationary PCs glued to the desk. The attack vectors to break into an end-user device were also slim. Can you imagine that the first ransomware attack was distributed via 5.25-inch floppy disks to the attendees of a WHO conference? Back then, protecting endpoints involved anti-malware tools that sniff out suspicious files based on static signatures. That seemed satisfactory for the time it served.

With most employees working on-site, the focus gradually shifted from endpoints to perimeter. Companies had a clear delineation of the corporate boundary and considerable control over what enters the network. This network perimeter made it simple to cast a wider net that protects all the assets within the enterprise. Under this assumption, firewalls and secure web gateways took precedence, while endpoint security faded in the background.

Today, the endpoint repertoire includes a whole host of devices ranging from servers, virtual machines, laptops, smartphones, and tablets. The increased mobility enabled by modern devices has driven the culture of work from anywhere. As devices began moving beyond the corporate bounds, security leaders soon realized the limitations of perimeter security, signaling the revival of endpoint security. But not until the pandemic was its importance fully understood. Work from home has existed for decades, but not at the same scale as now, and not with so much at stake. With the majority of the workforce operating out in the open, no longer air walled from the internet, the enterprise attack surface has expanded largely.

Explosion of the attack surface

Employees working from home or public spaces remain exposed to plenty of attack vectors. From unprotected internet to public charging ports, every connection is a channel for malicious actors. Employees and partners might use personal devices to access corporate data, which might not have the same level of protection as its corporate counterparts. Adding to this is the proliferation of shadow IT, i.e., the use of unsanctioned and unmonitored file sharing and collaboration tools that prove to be fertile grounds for data leakage. Working remotely has blurred the line between personal and professional. Many remote workers often think of their work laptop as a personal device, letting their friends and relatives access their devices. While employees might be well-educated on phishing techniques, the same can’t be said of others using their devices. This raises concern among security leaders, especially when pandemic fears are paving ways for phishing.

The bottom line is endpoints now remain the door to corporate resources, making them an attractive target for intruders. Security is now expected to follow endpoints wherever they go. Correspondingly, security leaders are doubling down on various endpoint security strategies to offer a layered defense against the modern threat landscape.

Adopting a Zero Trust mindset

There’s no one security layer that offers complete protection against cyberthreats. Endpoint security must address the increasing number of entry points as corporate data moves through every layer of the device. From devices to applications, peripherals, storage and browsers, every layer must be vetted before enabling access to the corporate resources. This operates on the philosophy of Zero Trust where you define and trust your protect surface and deny network access to all else. 

Trust established at a point in time doesn’t mean your network always remains secure. Security is a moving target. This is especially true in today’s hybrid workplace, where employees work from home or office or toggle between the two. Malware infections picked up at home brought into the office via unsecured personal devices open up opportunities for lateral movement. Consider the scenario of a phishing email being sent to all the recipients of a contact list from a compromised device. Trusting it to be from a legit user, other employees might open files and attachments, leading to organization-wide attacks. This is why IT security must continually evaluate trust to ensure devices, apps, users, and data are secure across time.

Upholding device hygiene and data protection

Devices shipped directly to the remote employee’s home are left with default configurations. Modern UEM solutions offer over-the-air techniques to ensure security policies are configured on devices irrespective of their whereabouts. Covering cyber hygiene essentials, such as monitoring for vulnerabilities, keeping software and antivirus signatures up-to-date, and encrypting hard drives, ensures the devices are hardened against threats. While it’s impossible to completely do away with shadow IT, corporate containment and browser isolation enables BYOD to access business apps and intranet without the data ever touching the device.

Post-infection detection and response

As much as protection is important, having a robust post-infection strategy ensures intrusions are detected at early stages and responded before developing into a full-blown breach. Today, behaviour-based detection and response tools employ AI to distinguish malicious anomalies from benign behavior. These techniques prove to be more effective at addressing sophisticated malware that shifts its signature frequently.

Unifying endpoint security architecture

With so many moving parts to secure and so many disconnected tools, security teams often operate in silos. Having an integrated solution fosters better coordination among all the security personnel involved. It also reduces remediation time, total cost of ownership, and IT overheads for integrating and managing point products.

With ManageEngine’s integrated endpoint security toolkit, remote users can work on any device from anywhere, while being as secure as they are within corporate boundaries. This brave new world of perimeter-agnostic security enables security leaders and employees to function fearlessly in the hybrid era.


Read More from This Article: Endpoint security renaissance in the era of hybrid work
Source: News

Category: NewsApril 29, 2022
Tags: art

Post navigation

PreviousPrevious post:WiSTEM bridges the gap between young women and STEM careersNextNext post:5 Key Considerations When Starting an Automation Project

Related posts

Modernization without disruption: How hybrid cloud empowers evolution
July 11, 2025
Raising the bar on private cloud – announcing VMware Cloud Foundation 9.0
July 11, 2025
Cuando se apagaron las luces… se encendió una nueva forma de pensar la seguridad
July 11, 2025
From fixed frameworks to strategic enablers: Architecting AI transformation
July 11, 2025
How Capital One drives returns on its AI investments
July 11, 2025
Top reasons for high CIO turnover rates
July 11, 2025
Recent Posts
  • Modernization without disruption: How hybrid cloud empowers evolution
  • Raising the bar on private cloud – announcing VMware Cloud Foundation 9.0
  • Cuando se apagaron las luces… se encendió una nueva forma de pensar la seguridad
  • From fixed frameworks to strategic enablers: Architecting AI transformation
  • How Capital One drives returns on its AI investments
Recent Comments
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.