Companies are using compliance tools to ensure that security policies are followed at network endpoints.
Computerworld - Like many companies, for several years Tripos Inc. has required employees who work remotely to install a firewall and antivirus software on the laptop or desktop PCs they use to connect to the corporate network via VPN.
But it wasn't until about a year ago that the St. Louis-based drug research company adopted measures to enforce end-user compliance with those requirements.
Technology from InfoExpress Inc. in Mountain View, Calif., helps Tripos monitor and audit all remote end-user systems to ensure that they have active firewalls and updated antivirus software. Systems that don't have both are automatically shut out of the Tripos network.
Tripos is one of a growing number of companies turning to monitoring and auditing technologies such as those from InfoExpress to enforce policy compliance at vulnerable network endpoints. The tools, many of which require software agents to be installed on client devices, inspect systems for active firewalls, the latest antivirus signatures, secure configuration settings and unauthorized privilege escalation.
The demand for such endpoint enforcement technologies is being driven by growing concerns that remote client devices could be compromised and used by attackers to gain entry into core production systems, says Jerry Wintrode, senior network architect at Tripos. For instance, this month's Sasser and last year's Blaster and Slammer worms spread primarily via infected client systems.
Privacy concerns and regulatory issues are also creating a need for endpoint compliance.
"Until you have something that absolutely enforces policies, you may as well admit that you have a back door into your network," Wintrode says. "You could make all the policies you wanted to and educate your employees until they are all security experts. But someone is still going to screw up."
For the most part, endpoint compliance technologies include agent software that's installed on end-user systems, an enforcement component and a policy management server tool. At a high level, the agent software sits on each client device and collects information on a variety of issues, such as the status of antivirus software, firewalls, host intrusion-detection systems, file versions, patches and registry values.
The enforcement agent typically sits between the client and the corporate gateway and audits this information for compliance with corporate policies. Systems that are compliant are allowed access to the network, while those that aren't are either automatically blocked or redirected to a quarantine site for fixes. In some cases, the tools can be used to bring an endpoint device into compliance, by turning on a firewall or downloading the latest antivirus signatures, for instance.
In other cases, the enforcement agent can send a message back to
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts