Back

Securing Divergent Endpoints

Executive Boardroom - 4:05 pm - 4:30 pm

Over the last few years, as cloud and mobile technologies have taken hold within the enterprise, the concept of the network perimeter has dissolved, and with it the concepts around traditional network security. The broad scale adoption of IoT technologies however will make this first phase of network disaggregation seem trivial in comparison as enterprises begin to connect to not just thousands but millions of disparate and divergent endpoints. To ensure appropriate security in such a dispersed networking world and entirely new paradigm to security will be required that encompasses not just wildly diverse types of devices in wildly diverse locations, but the threat of low-powered, low complexity endpoints that have no internal capacity for monitored and managed security capabilities.

Takeaways:

  • The number and type of enterprise endpoints is about to go through explosive growth and each of these endpoints will represent security threat
  • These new endpoints will not have the capacity for internal security and so central security solutions will be required to ensure appropriate protection
  • The volume and variety of new security data feeds and security threat info will overwhelm traditional security platforms and capabilities