Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Hands are typing on the keyboard of a laptop, in the foreground various digitally inserted internet images fly across the picture © istockphoto.com/metamorworks
  • Industry News
  • Management, Awareness and Compliance

Endpoint security: A key IT security challenge

Attackers prefer to target end devices, and the reason is simple: User programs and users are relatively easy targets. But the damage is significant, which is why protection is so important.

The starting point for major data thefts is often a laptop or PC, because that’s where users can be attacked directly. Any wrong click can have devastating consequences. Manufacturers of endpoint protection software are countering new attack vectors with new technologies like the cloud and artificial intelligence.

For attackers, the PC or laptop is still the main gateway into the company. This is where users sit, tempted by cyber criminals to click on a malicious link or open compromised Office documents. That's why these devices are at the forefront of IT security measures.

According to an IDG study (German), the security of end devices is the biggest IT security task for 38 percent of those surveyed in management or the board of directors. Endpoint protection therefore represents a significant cost factor: Up to one third of the security budget is spent on security. The total volume of this software segment is correspondingly large: The global market totalled just under 14 billion US dollars in 2020 and is expected to grow to over 22 billion by 2026, according to forecasts.

 

AI and the cloud become standard

The cost drivers are new attack vectors that software providers can only counter with adapted technologies. Due to the staggering increase in the number of malware variants, which are created individually for specific attack targets at short notice, the traditional signature-based malware detection no longer works (read more). To be able to react faster and more flexibly, manufacturers of endpoint protection products are relying on cloud technologies and artificial intelligence (AI). Using machine learning, the software adapts to new types of threats. Instead of byte sequences, it looks for suspicious behaviour patterns, i.e., conspicuous actions on computers. This could be a user who was just logged in at the company's domestic location but suddenly accesses company data from China or other faraway regions. Or even users accessing data they’ve never used before. To detect these kinds of anomalies, endpoint products work in a networked structure and exchange information with cloud servers. This enables the AI that’s deployed centrally to identify comparable anomalies from different companies occurring at the same time and establish correlations.

In addition, almost all major providers of protection software operate their own security operation centers (SOC) to perform analyses. The software installed on company endpoints also serves as a sensor. The global network of these sensors can detect correlations with individual anomalies and detect attacks early on. This leads to warnings or updates for all customers. As a rule, smaller competitors can’t offer this advantage to large providers.

 

Dangers beyond PCs and laptops

But AI solutions aren’t always the better choice: The systems need time to learn and require appropriate learning material. Criminals have long since adapted to this and try, for example, to irritate learning algorithms by flooding them with false information. If attackers succeed in penetrating the company, the first thing they often try to do is shut down the AI.

Often overlooked in the planning of protective measures is the fact that PCs aren’t the only end devices. Laptops, tablets, smartphones, and IoT devices are also considered endpoints that need of protection. If they form a weak point in the protection concept, they easily become the starting point from where attackers hijack the network.

Author: Uwe Sievers

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.