What is endpoint protection and security?

If you do a random search on the web for endpoint security, you will see thousands of hits coming back from hundreds of vendors saying endpoint security is the most critical of all applications.

This is pushed to the point where you could easily get the impression that it is necessary to throw your entire budget at this and nothing else. The difficult part when it comes to saying what constitutes endpoint security, however, is just how much it actually covers. 

What is the endpoint?

There are two schools of thought when it comes to answering the question “What is the endpoint?” The classic answer to this question used to be your demarcation point (or demarc location): where your connection arrives at your facility. Fast forward to now, when watches, vehicles and toasters potentially have dedicated 4G connections while simultaneously attaching to Wi-Fi networks, and suddenly the classic answer is much more difficult to stand by.

So what is the endpoint? The effective answer is anything that connects to our network, but that only tells part of the story. 

Let’s say for a moment that a single hypothetical user has been issued a workstation, laptop, mobile

Read More: https://resources.infosecinstitute.com/topic/what-is-endpoint-protection-and-security/