Protecting Enterprise Data on the Endpoint

a strategic approach

Cover from Protecting Enterprise Data on the Endpoint

Date: 10th November, 2008
By: Nigel Stanley
Format: White Paper

Download (subject to terms)
To access this paper you must first register and then login

IT security is tough, and just when organizations believe they have covered all possible threats others emerge that require immediate attention.

And so it is with the need to secure endpoints, those myriad of devices each capable of storing corporate secrets, social security numbers, names, addresses and other private details, and each capable of being lost or stolen.

There is no doubt that laptops, removable media, handheld organizers, smartphones, memory sticks and cell phones all improve business productivity and their sensible use can only be encouraged.

In light of the increase in use of endpoint devices it is the role of business to understand the costs of not securing these productivity tools and the impact of an endpoint security breach on profits, reputation and personal executive liabilities. Data protection is now a strategic imperative and the purchase of a solution will increasingly be made by business executives.

Similarly, it is the role of IT security to step up to the mark and support the safe and secure use of these business tools using a cost effective strategic approach, rather than tactical end point solutions that address the problem piece meal.

This paper explores the protection of enterprise data on endpoint devices.

Post a review?

We welcome constructive criticism on all of our published content. Your name will be published against this review after it has been moderated. We reserve the right to contact you by email if needed.

Star Rating 1-5 (low-high):

If you don't want to see the security question, please register and login.