Scottsdale, AZ (PRWEB) July 30, 2014
Endpoint security has two major components – protecting endpoints from attack and reducing the attack surface. How to do this effectively and clear buying criteria for the upcoming year are the topics of the new 2015 Endpoint and Mobile Security Buyer’s Guide authored by Securosis Analyst/President, Mike Rothman and licensed by Lumension.
For reasons that include Windows XP end of life, device sprawl, BYOD and many others, endpoint security is an ongoing challenge, says Rothman. The important thing is for organizations to first realize they are a target. “No organization should think they are exempt,” says Rothman in the report. “Everyone has something someone wants to steal, regardless of size.”
IT security pros tasked with securing organizational data need solid strategies around anti-malware, endpoint hygiene that includes patch, configuration management and device control, as well as mobile security. In the new Buyer’s Guide, actionable steps across each of these areas have been outlined.
“If different teams handle different functions, an integrated platform may not offer significant leverage. There is no right answer to this question, but organizations should make sure to consider operational responsibilities as they work through the process,” says Rothman.
To address growing concern over BYOD, how to manage and secure mobile devices has an extended section in the new Buyer’s Guide, including features to look for and how best to leverage them with other security solutions an organization may already employ.
“We increasingly expect mobile security capabilities to be bundled with broader endpoint security and IT management offerings. We’ve seen almost every emerging market start as standalone technology that ultimately gets wrapped into a broader offering,” Rothman said.
Detailed in the report is clear buying criteria that includes important features to look for as well as important questions to ask and a simple procurement process.
“The challenges stacked against IT are many but they aren’t insurmountable,” said C. Edward Brice, Senior Vice President, Worldwide Marketing, Lumension. “In the 2015 Endpoint and Mobile Security Buyer’s Guide, the analysts at Securosis did a thorough job of outlining both current and future considerations. In our resource center, we then suggest proven approaches for addressing those situations effectively and efficiently.”