Intelligent CISO Issue 02 | Page 85

Enterprise IT teams clearly need to focus on endpoint security management .
ramifications . The result is more users are more likely to leak enterprise data by using compromised websites and rogue online services . The CVE listed 14,712 cybersecurity vulnerabilities for 2017 and has already listed 2,848 for the first two months of 2018 . In response , vendors large and small are releasing patches on a daily basis . Enterprise IT teams clearly need to focus on endpoint security management to ensure business success in the mobile-cloud era .
Endpoint security challenges
Keeping endpoints up to date with the latest versions of their operating systems and applications has become a full-time job , one that is getting harder to perform in the mobile enterprise . A growing challenge is the diversity of endpoint operating systems that must be managed , including Android , iOS , MacOS , Windows , Linux , and Chrome OS .
For each , the IT team must learn that operating system along with its corresponding patching technique . Likewise , applications acquired from the various app stores are managed with different techniques that must be learned and mastered so that the team can secure the endpoints . Another challenge is managing the endpoints from day one , especially mobile devices . While it ’ s been relatively easy for IT admins to install agent software on desktops and laptops , smart phones and other mobile devices make life harder for the admins because the devices are rarely if ever connected to the corporate network .
Consequently , devices must be provisioned with the necessary mobile device management software before they are given to end-users . Devices that are not appropriately managed are security risks , so no business application should be installed or run on them .
Related to the day-one management challenge is updating endpoints that are on the go , anytime and anywhere .

Enterprise IT teams clearly need to focus on endpoint security management .

IT teams must be able to install critical patches while employees are travelling , commuting , or otherwise offsite .
Data leakage presents yet another security challenge for IT teams to overcome . Data leakage can happen with or without the knowledge of users . For instance , users may knowingly copy business data to a USB device or upload it to a cloud storage service .
They may also unknowingly expose that data to a public cloud service when using third-party apps such as document viewers and predictive keyboard apps . Such apps may compromise user IDs and passwords , account numbers , and other sensitive enterprise data by exposing it to public cloud services .
When a user ’ s device is lost or stolen , the IT team must be able to track and recover the device or wipe the data if the device isn ’ t recovered . To maintain the user ’ s privacy , however , the IT team cannot continuously track the location of the user ’ s device .
BYOD presents another privacy vs security challenge : When users use their own devices for business purposes , www . intelligentciso . com | Issue 02
85