An endpoint is a remote computing device that communicates back and forth with a network to which is it connected. Examples of endpoints include:
Endpoints represent key vulnerable points of entry for cybercriminals. Endpoints are where attackers execute code and exploit vulnerabilities, and where there are assets to be encrypted, exfiltrated or leveraged. With organizational workforces becoming more mobile and users connecting to internal resources from off-premise endpoints all over the world, endpoints are increasingly susceptible to cyberattacks. Objectives for targeting endpoints include, but are not limited to:
· Use the endpoint as an entry point into an organization to access high-value assets and information.
· Access assets on the endpoint to exfiltrate or hold hostage, either for ransom or purely for disruption.
For several decades, organizations have heavily relied on antivirus as a means to secure endpoints. However, traditional antivirus can no longer protect against today’s modern threats. An advanced endpoint security solution should prevent known and unknown malware and exploits; incorporate automation to alleviate security team workloads; and protect and enable users without impacting system performance.