What is an Endpoint?

2min. read

Endpoints are remote computing devices that connect to a network and communicates back and forth with the network.

An endpoint is a remote computing device that communicates back and forth with a network to which is it connected. Examples of endpoints include:

  • Desktops
  • Laptops
  • Smartphones
  • Tablets
  • Servers
  • Workstations

Endpoints represent key vulnerable points of entry for cybercriminals. Endpoints are where attackers execute code and exploit vulnerabilities, and where there are assets to be encrypted, exfiltrated or leveraged. With organizational workforces becoming more mobile and users connecting to internal resources from off-premise endpoints all over the world, endpoints are increasingly susceptible to cyberattacks. Objectives for targeting endpoints include, but are not limited to:

  • Take control of the device and use in a botnet to execute a DoS attack.
  • Use the endpoint as an entry point into an organization to access high-value assets and information.
  • Access assets on the endpoint to exfiltrate or hold hostage, either for ransom or purely for disruption. 

For several decades, organizations have heavily relied on antivirus as a means to secure endpoints. However, traditional antivirus can no longer protect against today’s modern threats. An advanced endpoint security solution should prevent known and unknown malware and exploits; incorporate automation to alleviate security team workloads; and protect and enable users without impacting system performance.

Related Resources

Article

What is an EDR Platform?

In a SaaS model—where a company’s applications and data reside on third-party infrastructure, and the company’s employees can access those apps anywhere, from any device— taking a traditional approach to security is not enough.

Read
Article

5 Ways Endpoint Security and Network Security Should Work Together

Wrong endpoint security solution can leave your endpoints vulnerable to threats and undo the work that has gone into securing the network.

Read