Endpoint Security: Securing the iPod generation

  • Authors:
  • Miles Clement

  • Affiliations:
  • Information Security Forum

  • Venue:
  • Network Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Endpoint security used to be easy - green screen terminals were heavy, cumbersome, and fixed to the floor. All that has changed, and it is now increasingly difficult for organisations to identify what is an endpoint, as they range from desktops to laptops to iPods. Securing devices that are highly portable and mobile presents challenges to organisations. While the technical solutions are largely understood, the main difficulty lies in adopting a comprehensive yet practical approach to securing a highly heterogeneous and dynamic technical environment.