Skip to main content

Endpoint Security Justification and Establishment

As the information security officer at a prominent utilities organization, I witnessed first hand the pitfalls of providing network security only at the network perimeter, the false sense of security, and the potential monetary, regulatory and credibility consequences this traditional solution provides. After discovering the problem to be a prevalent one, and concluding that the situation would not go away, persuaded the CIO, IT management, and IT department representatives to allow me to research and provide a tactical and strategic solution. The goal of my 2 months research was to find the right solution to the problem. The industry terminology of the solution is called Endpoint Security. Endpoint Security extends the traditional security perimeter to network's edge device or end users device. End user devices are most commonly the workstations and laptops used to access a corporate network. Utilizing endpoint security vendor analysis and product evaluations, insightful presentations and communications with the CIO and IT management, I was able to obtain funding for this solution and pilot test with minimal user impact.

1525 (PDF, 3.54MB)

18 Jan 2005
BySamuel Ho
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.