Endpoint security protects laptops, mobile phones, tablets, POS (Point-Of-Sale) terminals, and other endpoint devices from threats through a centrally managed server. The server communicates with client programs running on each endpoint device, enabling it to:
-
- Provide administrators with visibility and control over those devices
- Provide an endpoint security VPN to each user attempting to connect
- Correlate information obtained from clients to discover possible threats
- Validate user credentials when an endpoint connects to the network
- Scan individual endpoints to see whether they adhere to security policies
- Restrict/quarantine/remove those that don’t meet security policy requirements
A comprehensive endpoint security plan typically incorporates the following solutions: