Companies are using compliance tools to ensure that security policies are followed at network endpoints.
Computerworld - Like many companies, for several years Tripos Inc. has required employees who work remotely to install a firewall and antivirus software on the laptop or desktop PCs they use to connect to the corporate network via VPN.
But it wasn't until about a year ago that the St. Louis-based drug research company adopted measures to enforce end-user compliance with those requirements.
Technology from InfoExpress Inc. in Mountain View, Calif., helps Tripos monitor and audit all remote end-user systems to ensure that they have active firewalls and updated antivirus software. Systems that don't have both are automatically shut out of the Tripos network.
Tripos is one of a growing number of companies turning to monitoring and auditing technologies such as those from InfoExpress to enforce policy compliance at vulnerable network endpoints. The tools, many of which require software agents to be installed on client devices, inspect systems for active firewalls, the latest antivirus signatures, secure configuration settings and unauthorized privilege escalation.
The demand for such endpoint enforcement technologies is being driven by growing concerns that remote client devices could be compromised and used by attackers to gain entry into core production systems, says Jerry Wintrode, senior network architect at Tripos. For instance, this month's Sasser and last year's Blaster and Slammer worms spread primarily via infected client systems.
Privacy concerns and regulatory issues are also creating a need for endpoint compliance.
"Until you have something that absolutely enforces policies, you may as well admit that you have a back door into your network," Wintrode says. "You could make all the policies you wanted to and educate your employees until they are all security experts. But someone is still going to screw up."
For the most part, endpoint compliance technologies include agent software that's installed on end-user systems, an enforcement component and a policy management server tool. At a high level, the agent software sits on each client device and collects information on a variety of issues, such as the status of antivirus software, firewalls, host intrusion-detection systems, file versions, patches and registry values.
The enforcement agent typically sits between the client and the corporate gateway and audits this information for compliance with corporate policies. Systems that are compliant are allowed access to the network, while those that aren't are either automatically blocked or redirected to a quarantine site for fixes. In some cases, the tools can be used to bring an endpoint device into compliance, by turning on a firewall or downloading the latest antivirus signatures, for instance.
In other cases, the enforcement agent can send a message back to
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts