Skip to content ↓ | Skip to navigation ↓

In the good old days of security endpoints, we used only desktops and deployed anti-virus solutions to protect them. But things have changed in the past couple of years.

Today, the definition of endpoints has exploded thanks to the Internet of Things, a phenomenon marked by smart cars, smart appliances, and of course, mobile devices. In this new world of ubiquitous connectivity, anything and everything that can connect to your network is now not only an endpoint but also a potential access point which malicious actors can leverage to launch targeted attacks.

Acknowledging these threats, it is dangerous for us to not be aware of the endpoints connected to our networks and to not have an endpoint protection strategy designed to remediate the associated risks – such ignorance could very well be a recipe for disaster.

Fortunately, customers can now choose from a wide variety of security maturity models to help them build an effective security program. However, most of these solutions go only so far. If you’re serious about protecting the endpoints that house critical information or provide access to your network, you need to specifically think about security maturity for endpoints.

This is not a common train of thought in today’s world, and not everyone wants to be an early adopter. Yet, in the face of a growing list of major hacks and breaches, no one can afford to be a laggard when it comes to protecting your organization.

Screen Shot 2015-09-24 at 8.34.08 PMWith this in mind, SANS and Tripwire have collaborated on an endpoint security maturity model that provides a framework for continuous improvement. The core elements of this model include programs, policies, infrastructure, focus and awareness. Furthermore, there are five levels of maturity through which an organization can advance.

Interested in learning more? We invite you to join G Mark Hardy, SANS Analyst and Certified Instructor, and Dwayne Melancon, Tripwire Chief Technology Officer, for a webcast where you can explore this new model in greater detail and gain an understanding of how you can apply it in order to successfully assess your organization’s progress towards proactive security defense.

Register Here


Title image courtesy of ShutterStock