Implementation Should Be Gradual and Collaborative
- To know the type of endpoint strategy that’s best suited to your needs, you must understand how vulnerable your organization is to advanced or specifically targeted attacks.
- Cloud-based services may offer an effective solution to the difficult task of balancing security and risk mitigation with the company’s best interests.
“Business is transforming to a point where most user endpoints aren’t inside the infrastructure.”
David Merrill, senior director of data security for Travelers Insurance, is an advocate for endpoint security, but suggests the technologies and implementation should be well considered and companies should know exactly what they want to achieve before rolling out a new strategy. “There are signal flares that you need to worry about more advanced attacks,” he explains. “But you should also understand just how penetrated, how poked at, is your system. And from where?”