In today's fast-paced and global organizations are compelled to provide employees, business partners and customers access to company data, business applications and computing resources on a 24 x 7 basis, any where in the world and from a variety of endpoints, such as remote PCs and laptops, laptops and mobile units (cell phones) and third party devices. This access may be made feasible via the Internet and other trusted and untrusted networks. This complex environment provides the opportunity for the introduction of viruses, worms and malware that can inflict a number of unwelcome denials of service (DoS), potential destruction of files and data and, in today's heavily regulatory landscape, violation of privacy and financial losses and fines. There is a need to review your prevailing endpoint access and protection provisions ensuing that they are insular and that they do not rely on a single product or software element. This issue of COM-SAC provides some of the considerations for sound endpoint security.
展开▼