Endpoint security in the modern enterprise
Endpoints, such as workstations, laptops, tablets and smartphones, may contain sensitive information. How we use such endpoints are changing, as new device types become available, and due to trends such as Bring Your Own Device (BYOD). We discuss how to secure endpoints in modern enterprises in a scalable way.
Critical controls based on experience from earlier attacks guide how we discuss methods for different platforms. We identify the most important technical measures, and build a laboratory to test them. We also discuss how an endpoint security policy can guide users such that the technical measures will work efficiently, including in BYOD environments.
The tools and devices tested in our laboratory work together to provide security measures that will give good protection, such as complete inventory and effective security configuration. With some changes, the laboratory would work with an endpoint security policy we have drafted for an example enterprise.
Place, publisher, year, edition, pages
Institutt for telematikk , 2013. , 146 p.
IdentifiersURN: urn:nbn:no:ntnu:diva-22543Local ID: ntnudaim:3750OAI: oai:DiVA.org:ntnu-22543DiVA: diva2:649788
Bernsmed, Karin, Førsteamanuensis IISørensen, Jan Tore