This is the second part of Bloor analyst Fran Howarth’s series of blogs on MDR looks at endpoint security. Click here to read the first part.
At the core of managed detection and response (MDR) services is endpoint security. Taken at its broadest definition, an endpoint in computing terms is the entry point to a service.
Long gone are the days when an endpoint can be defined as just a piece of hardware used by an individual, such as a PC, workstation or mobile device. These days, endpoints are not just purely end user devices but rather can be anything connected to a network, including industrial systems and medical devices. Estimates vary widely, but the number of IoT connected devices are said to number in the billions. The types of endpoints that connect to corporate endpoints are shown in the figure below.
Convenience vs security
End user endpoints provide a convenient way to access resources and the more mobile they are, the more convenient they are. Cloud services are now widely in use and are used for storing an ever increasing amount of information, including that which is sensitive or confidential. Endpoint devices are used to access such services and to transmit and use much of that information. Even when the information is not stored elsewhere, endpoints such as smartphones can themselves contain vast swathes of information. And the apps that are installed on them are not always trustworthy as they are capable of leaking information and often require that users grant access to more information than the app needs. They can also be lost or stolen and access credentials for devices, applications and cloud services are too easily compromised.
IoT devices are rarely adequately secured either. Yet, devices such as medical equipment that are connected to networks contain extremely sensitive information and security researchers have demonstrated how hacking them could be life threatening.
As endpoints have proliferated, adversaries have increasingly used them as a conduit for infiltrating networks and services with malicious threats. According to the Ponemon Institute, 68% of respondents reported in 2019 that they had experienced one or more endpoint attacks that successfully compromised data assets and/or IT infrastructure during the year, up from 54% in 2017. The cost per endpoint breach is also skyrocketing, averaging $9 million in 2019, up more than $2 million over 2018.
Hence, this is why endpoints are so important and why their defence is central to MDR services and protecting them, detecting threats and responding to incidents impacting endpoints is core to MDR.
Wow! This blog looks exactly like my old one! It’s on a entirely different subject but it has pretty much the same page layout and design. Excellent choice of colors!
It’s really a nice and helpful piece of info. I am happy that you simply shared this useful info with us. Please keep us up to date like this. Thank you for sharing.
Pretty nice post. I just stumbled upon your weblog and wanted to say that I’ve really enjoyed browsing your blog posts. In any case I will be subscribing to your feed and I hope you write again very soon!
You have mentioned very interesting details! ps decent internet site.
There are some fascinating points in time in this article but I don’t know if I see all of them heart to heart. There may be some validity but I will take hold opinion until I look into it further. Good article , thanks and we would like extra! Added to FeedBurner as well
Hey there! Someone in my Myspace group shared this website with us so I came to look it over. I’m definitely loving the information. I’m book-marking and will be tweeting this to my followers! Fantastic blog and brilliant design and style.
Good day! I know this is somewhat off topic but I was wondering which blog platform are you using for this site? I’m getting fed up of WordPress because I’ve had problems with hackers and I’m looking at alternatives for another platform. I would be awesome if you could point me in the direction of a good platform.
Your site rules. Thanks for making it
Oh my goodness! an incredible article dude. Thank you Nevertheless I am experiencing concern with ur rss . Don’t know why Unable to subscribe to it. Is there anybody getting equivalent rss drawback? Anyone who is aware of kindly respond. Thnkx