{"id":2036,"date":"2004-02-01T00:00:00","date_gmt":"2004-02-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/01\/demand-for-endpoint-security-growing\/"},"modified":"2021-12-30T11:40:31","modified_gmt":"2021-12-30T11:40:31","slug":"demand-for-endpoint-security-growing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/01\/demand-for-endpoint-security-growing\/","title":{"rendered":"Demand for Endpoint Security Growing"},"content":{"rendered":"<p>Michael Rasmussen Director of Research, Forrester Research, says that organizations have felt the sting of focusing security on the perimeter while neglecting to secure the end points (such as desktops, laptops) in the enterprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are organizations and vendors doing to provide for the security of systems behind the Internet perimeter?<\/p>\n<p>Host security can be broadly defined in a comprehensive host security system that encompasses configuration management, virus scanning, host intrusion detection\/protection, and firewall capabilities.  However, the deployment of these technologies may still fail if not updated or improperly configured.<\/p>\n<p>Thus, organizations are looking to validate host\/endpoint security through checking the correct configuration and operation of host security controls before allowing connections to internal systems.  When the workstation connects, whether attached directly to the corporate LAN or remotely via a VPN tunnel, endpoint security verifies that the system is hardened, properly patched, running up to date anti-virus software, and that the host firewall is up and running with the proper rulebase before allowing it to connect to the internal network.<\/p>\n<p>More info: [url=http:\/\/www.csoonline.com\/analyst\/report2170.html]http:\/\/www.csoonline.com\/analyst\/report2170.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2036","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2036"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2036\/revisions"}],"predecessor-version":[{"id":4523,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2036\/revisions\/4523"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}