• 09/26/2020

Security chain of four makes endpoints secure

Secure computers, secure network: the formula for success for malware-free working in companies sounds simple. Experts consider four protective measures a must.

Written by Michael Klatte

itsa365: Graphics on laptop about endpoint security
Sometimes, unfortunately, special circumstances are needed to spark off long overdue changes. The radical transformation of the world of work in the wake of the Corona crisis demonstrates this impressively, particularly with regard to IT security. For years, security experts have been recommending that the endpoint be particularly strongly secured. Apart from the installation of an anti-virus solution, often very little has happened - many administrators thought that the computers in company offices were well protected by firewalls and other measures. 

Paradigm shift in IT security through mobile working


But things turned out differently: from one day to the next, employees moved into the home office. And they left the secure network environment. Practice shows that many organisations and their employees are not sufficiently protected within their own four walls. A current study by the German IT Security Association (TeleTrusT) proves: Only two thirds of all computers are password-protected, only six out of ten use anti-virus software and only one in five secure network access with multi-factor authentication. 


The country needs new security

Michael Schröder, technology and data protection expert at ESET Germany, knows what modern endpoint protection could look like: "A high-performance anti-malware solution is mandatory for every device. In combination with a hard disk encryption and multi-factor authentication solution as well as cloud sandboxing, administrators transform PCs and laptops into the so-called multi-secured endpoint. The good thing about it: With this security four-chain, they are perfectly secured everywhere - in the company office, in the home office or in mobile use.


Encryption stops data sniffers

All information stored on the endpoint should be protected from prying eyes or in case of loss. By using encryption, those responsible kill two birds with one stone. Cyber criminals cannot do anything with the encoded data and at the same time the company complies with the requirements of the basic data protection regulation. A prerequisite for the success of encryption is user acceptance. Therefore, the solution should hardly be "noticeable" and reliable in its daily work. A good example is "ESET Full Disk Encryption" (EFDE) with pre-boot authentication, which reliably secures entire device hard disks.


From home office to network: Only with multi-factor authentication

For every administrator it is a nightmare when someone logs into the network whose identity is not clearly defined. Therefore, multi-factor authentication should be implemented additionally. There are a number of solutions on the market that are easy to use and inexpensive to purchase. Professional software solutions such as "ESET Secure Authentication" (ESA) pave the way for secure access to online applications and network environments. In less than a quarter of an hour, complete networks with thousands of computers can be equipped with them. No additional hardware purchases are necessary, existing smartphones, FIDO sticks or other tokens can be integrated without any problems.


Cloud Sandboxing keeps the letterbox clean

Detecting malicious emails or downloads is an important cornerstone for optimal security. Especially the reception of office documents, PDFs and sometimes executable files are part of everyday life in the home office. Nothing would be worse than if ransomware, for example, were to penetrate through this loophole, unintentionally encrypting all data and making it inaccessible. ESET Dynamic Threat Defense (EDTD) with its cloud-based sandbox provides a remedy. Suspicious and potentially dangerous binary code is transmitted to ESET's European computing cluster on the basis of precisely defined rules and "uncovered" there using state-of-the-art machine learning algorithms.