endpoint detection system

For a long time, the metaphor most applicable to cybersecurity systems was that of a castle. You have walls and a moat to keep people out, and a secured gate that allows you to provide access to those people you give permission to enter. However, just as the belief that walls and a gate could prevent people from entering a city in medieval times was limited and inadequate, so is cybersecurity that focuses entirely on just keeping bad actors out.

It turns out that even the best walls have ways to get around them. Constantinople was betrayed by what was, in effect, a side door. Troy fell because something that was allowed within its walls was not properly monitored once inside. So your security system will fail if it doesn’t do anything more than put up a wall that it assumes nobody will get past.

One of the hottest terms in cybersecurity these days is Endpoint Detection System. It’s required to be implemented by many insurance companies and governmental entities, and many companies require it of their business partners and vendors. However, just like the castle walls, without other parallel security systems, without making sure that whatever gets past the endpoint security is detected, your Endpoint Detection System will be as effective as Constantinople’s famous front gate. We discuss on this week’s episode:

For more information, resources, and a transcript of this episode, check out the original post.

Pin It on Pinterest

Share This