No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

Endpoint Security Won’t Solve All Your Needs

by Carlos Pelaez
June 1, 2015
in Compliance
Endpoint Security Won’t Solve All Your Needs

Companies are rushing to buy endpoint security and may be misinformed when it comes to the remaining risks. Vendors that produce endpoint security have a self-serving interest to make statements that mislead the buyer into believing that their solution will put them out of scope from compliance needs or that the risk of a breach is properly covered.

The reality is that endpoint security is only one tool in an arsenal that companies should use. Yes, endpoint security is a good thing. However, so are other key IT security tools and methods, such as:

  • Network Segmentation—where the network is divided into smaller sized portions so that the strongest security resources can be focused on the network areas with the critical data.
  • Whitelisting Applications—allowing only pre-authorized applications to run and restricting every other process at the CPU level to lock down any potential virus or malware.
  • Least Privilege Access—a security approach where users are only able to do enough to get their job done and not are not granted access to do anything more than what is required. This restricts data and systems to a need-to-know basis.

In addition, endpoint security will not remove your organization from scope or compliance regulations. While encrypting the data and securing the devices that can extract the data is important, compliance is still required and will include many other factors. For example, endpoint security will not resolve the following common compliance areas:

  • Change Management—the process for making changes to systems, applications and other IT offerings that are used by end users and customers.
  • Logical Access—administering user IDs and passwords and removing users when they leave the company, which requires role-/group-based security to administer and restrict access.
  • Disaster Recovery Planning—in the event of emergency, the IT systems will need to be restored in an alternative location so that the business can continue to operate.

The misconception that endpoint security will solve everything cybersecurity-related is not unexpected. There are numerous risks around losing data that endpoint security accommodates. For example, if the data is encrypted in a way that makes it inaccessible to any unapproved or unauthorized device, it can help keep that data safe. However, the data can still be removed by someone who works at the organization and has access to the corporate network. This insider threat can be a significant risk. The insider may take the data intentionally. For example, Snowden took hard drives and other data from the NSA that had been encrypted because he had the keys to unlock them. Other times it may be accidental, such as from malicious software that has taken over a computer and leaks the data onto the Internet. Another benefit touted by vendors of endpoint security is that only authorized devices can access the network, which reduces the possible attack surface for an organization. This is a great perspective on security, but its specific benefit can be reduced when a device is stolen, when it is taken over by malicious software or when the security keys that mange endpoint security are compromised. The use of endpoint security often resolves one potential threat, but it then makes another area even more critical, such as key management.

Key management in endpoint security relates to the ability to decode the encrypted data and allow users to access it. Those keys must be guarded, and the risk that organizations will purchase endpoint security and forget to focus on this step is high. Once organizations invest in security tools, they begin to feel secure, and this false sense of security is a significant trap. It is very common for organizations not to know all of the methods for key management and for complacency to set in because the latest tool purchased was thought to keep the organization safe.

Ultimately, endpoint security is only one of many tools and should not be accepted as a panacea to all of the organization’s cybersecurity risks. Endpoint security should be approached as a powerful tool, but the enthusiasm that drives an organization to purchase it and implement it should also drive them to clearly understand how it maps to their needs. The solution should be mapped to specific compliance areas and compliance controls. The solution should also be architected in a way that it shows how all of the security tools and procedures come together to provide a more secure environment. Endpoint security will not solve every problem, but it is a good tool and it should also be supported with a holistic cybersecurity strategy.


Previous Post

OMG! #SocialMedia & #Compliance? ROFL!

Next Post

5 Tips for Companies on Navigating Facilitation Payments in India

Carlos Pelaez

Carlos Pelaez

June 1 - Carlos PelaezCarlos Pelaez is the National Practice Leader for Coalfire’s practice area focused on serving Service Organizations and Internal Audit departments. He provides the framework and methodology to local audit teams so that they may be well equipped to validate compliance and cyber-security needs for cloud based solutions.

Related Posts

GFT Canada Update

GFT Expands AI Compliance Suite for Canadian Credit Unions

by Corporate Compliance Insights
May 8, 2025

Digital transformation company GFT has expanded its compliance suite to help Canadian credit unions combat payment scams and identity theft...

AxiomGRC Launch

Business Resilience Platform Axiom GRC Enters Global Market

by Corporate Compliance Insights
May 8, 2025

A business resilience platform called Axiom GRC has launched in the UK, backed by £500 million private equity investment from...

MyCOI Launch

myCOI Launches AI-Powered Insurance Compliance Platform

by Corporate Compliance Insights
May 8, 2025

Insuretech provider myCOI has launched illumend, an AI-powered platform designed to manage third-party insurance compliance and certificate of insurance processing....

Beachhead Documentation Launch

Beachhead Solutions Launches Compliance Documentation Tool

by Corporate Compliance Insights
May 8, 2025

Data security provider Beachhead Solutions has launched ComplianceEZ, a new compliance documentation tool built into its BeachheadSecure platform. The tool,...

Next Post
5 Tips for Companies on Navigating Facilitation Payments in India

5 Tips for Companies on Navigating Facilitation Payments in India

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights