Secure LabsInformation Assurance

Perimeter and Endpoint Objectives

We see attacks targeting the endpoint device to obtain data or to gain access to systems containing data and to leave behind a method for future access. Its great when the compromised endpoint phones home to you with the stolen data. To prevent that from happening we suggest the following

  • Encryption Denying Access to data
  • Web and Email Content Management
  • Access Control
  • Perimeter Sandboxing
  • Identity Validation
  • Host based Intrusion Detection
  • Identity Management
Perimeter and Endpoints Place the Enterprise At Risk
Endpoints are the best pathways for compromise

Rather than coming in through the front door it is by far simpler to comprosmise a client and piggy back into the Enterprise network. A trusted client is a trusted client right?