In the Bring Your Own Device (BYOD) world we operate in, endpoint security is not an optional extra in your IT plan. It’s your BYOD’s — and ultimately your network’s — best friend forever. Also called “client devices,” “endpoint” refers to laptops, smartphones, tablets, and so on: devices that can be disconnected and reconnected to your infrastructure (or firewall). Endpoint security is a protective layer on the device itself, which is susceptible to attack when it is detached from its firewall.
BYOD is gaining a stronghold in how we do business. If it isn’t happening currently at your company, it will. And when it does, your business is at risk if you don’t have a proven, multilayered security solution that addresses your client devices along with your gateway and server. According to Forrester’s Forrsights Workforce Employee Survey, Q4 2011, 53 percent of workforce employees worldwide use their own technology for work purposes.1
Understanding how those devices are susceptible to malware attack is critical. For instance, your company’s #1 salesperson is using her laptop at a roadshow or checking email during a break at a coffee shop. She unknowingly downloads a malware file while on the wireless network. Then, she reconnects her laptop back at the office with your network and now both are infected. That’s all it takes to destroy your hard-earned and vital information.
That ill-fated scenario is readily avoided. Protection is easily deployed, managed and maintained through a simple user interface. A Dell SonicWALL expert explains how in this anti-virus and anti-spyware demonstration.Tags: BYOD,Gadgets & Devices,IT Security,Technology