The headlines say it all – another data breach at a major corporation. For the longest time, IT and security professionals have subscribed to the theory that the easiest way to protect corporate data and computing is to track and monitor security from the datacenter – a top-down approach. Yes, protecting endpoints is important – after all, that’s what anti-virus is for, right?
In recent times, however, the narrative appears to be changing. CIO’s and CISO’s have begun to realize the stark truth – the end-user and the endpoint are the weakest link in the corporate computing environment. Perhaps this realization has been slow coming. After all, the last thing IT wants is another agent on the endpoint to potentially impact system, and ultimately, worker performance. However, according to the Verizon 2015 Data Breach Investigations Report, data pertaining to web app attacks in the financial services sector, finds end-user devices were a factor in 82% of incidents and nearly a tenth of them involve some human element (phishing/social).
I would say, it’s definitely time to pay attention to the end-user and endpoint!
With BYOD, mobility and the cloud becoming evermore the norm, CIO’s and CISO’s are starting to acknowledge that legacy solutions and methods for securing the environment may be ill-prepared to deal with the new trends in computing.
A recent article in TechCrunch suggests that more than just AV and EDR to protect end-users and endpoints, what’s really needed are solutions that help companies securely transition to cloud environments and quickly and intelligently sift through reams of endpoint data to make IT more responsive, agile, proactive and secure.
I couldn’t agree more.
Nexthink helps IT organizations better understand their infrastructure, security and end-user experience by gathering vast amounts of availability, performance, security, and other types of data and then attempts to filter out the “noise” to discover significant complex patterns effecting your security. Clearer understanding allows IT to provide faster targeted support and make better informed IT decisions, leading to improved security and greater end-user efficiency and satisfaction.
For better security the “doctor” says, it’s time to pay attention to your end-users and endpoints.