Encryption & Endpoint Protection

Today’s workforce is becoming increasingly agile and mobile, with the freedom to work from anywhere, across a range of devices, tablets, laptops, mobiles. Whilst this freedom is of great benefit to organisations it also comes with great risk – where is your data and how is it protected?

Device encryption is now a must-have in the security stance of all organisations across all sectors. The mechanisms put in place need to combine centralised management and reporting with the ability to manage all encryption methods, FileVault for Mac, BitLocker for modern Microsoft Windows and proprietary sector-based for legacy and other systems.

Loss of trust, data privacy, compliance – all are motivating factors in the drive behind data encryption. The General Data Protection Regulation (GDPR), has removed any choice, making data encryption a legal requirement. GDPR affects all organisations, regardless of location, that hold data on EU citizens and the consequences of a data breach could be severe; fines of up to 4% of worldwide annual turnover or €20 million, whichever is the greater could be imposed. Suddenly that encryption project doesn’t look so expensive. When you’re ready to get started get in touch and we’ll help you along the way.

Endpoint Protection

Endpoint protection is no longer just about protecting against viruses. Today the threats are many and varied. They about manipulating the user, as well as exploiting vulnerabilities in security software and operating systems. Your endpoint protection solution must reflect this and give protection against all attack vectors:

  • Signatureless anti-malware – to protect against zero-day attacks.
  • Protection against Cryptoware – to protect against encrypting malware.
  • Exploit prevention – to protect against known and unknown Common Vulnerabilities and Exploits (CVEs).
  • Malicious Traffic Detection – to block malicious traffic and identify the originating process and file.
  • Intrusion Prevention – to monitor for and block suspicious behaviour..
  • Automatic clean-up – to ensure the threat is automatically removed.
  • Isolation of malware and infected endpoints – to prevent the propagation of malware across the network.
  • User education – to teach the workforce how to recognise social engineering attacks, spam, phishing, fake calls.