EPS a topic of much confusion

Client PC's may now be open to faulty security

Widespread confusion about the installation of endpoint security (EPS) on enterprise client PCs is leaving firms vulnerable to malware, spam and malicious code, experts have warned.

A new IDC report, Navigating the Client Security Fog: Helping the Enterprise Solve the Endpoint Security Crisis, found that most enterprises have trouble even agreeing on what endpoint security actually means.

Despite this, a poll of 304 IT professionals and line-of-business managers found that IT managers are gearing up to deploy EPS in increasing numbers.

“The complexity of the EPS problem has profound effects throughout an organisation,” said Allan Carey, manager of IDC’s security and business continuity services program.

“Enterprise senior management, as well as IT and business unit leaders, must see the big picture to address concerns about security, mobile device use and employee productivity, remote access and centralised access control.”

Ian Kilpatrick, chairman of the Wick Hill Group, said he is already discussing endpoint projects with VARs. “SMEs aren’t far enough into the security pain barrier to actually pay for them. Enterprises, on the other hand, are already discussing projects. They realise that with so many people coming in and out of the building with laptops and PDAs, there is a need to secure the endpoints.”

Kilpatrick said securing endpoints also has two main functions: “It gives defence to the network through the client and also means security policies will be applied as they will be enforced through the endpoint security.”