What’s considered an endpoint?

Endpoints can range from the more commonly thought of devices such as:

  1. Laptops
  2. Tablets
  3. Mobile devices
  4. Smart watches
  5. Printers
  6. Servers
  7. ATM machines
  8. Medical devices

endpoints-anywhere-infographic

If a device is connected to a network, it is considered an endpoint. With the growing popularity of BYOD (bring your own device) and IoT (Internet of Things), the number of individual devices connected to an organization’s network can quickly reach into the tens (and hundreds) of thousands.

Because they are entry points for threats and malware, endpoints (especially mobile and remote devices) are a favorite target of adversaries. Mobile endpoint devices have become much more than just Android devices and iPhones—think of the latest wearable watches, smart devices, voice-controlled digital assistants, and other IoT-enabled smart devices. We now have network-connected sensors in our cars, airplanes, hospitals, and even on the drills of oil rigs. As the different types of endpoints have evolved and expanded, the security solutions that protect them have also had to adapt.

The latest SANS endpoint security survey highlights the importance of implementing a comprehensive endpoint protection solution. Some of the key findings from this survey include:

  • 28% of respondents reported that their endpoints had been breached.
  • A variety of threat vectors were used, including web drive-by (52%), social engineering/phishing (58%), and/or credential theft/compromise (49%).
  • Only 39% of attacks were detected by traditional antivirus.
  • Another 39% of compromises were detected by SIEM alerts .