Redefining Endpoint Security

The point at which a device becomes "valuable" to criminals is typically when it combines both the device and the user credentials. As a result, an endpoint should not just be looked at as a device, system, computer, server or laptop. The definition of an endpoint should also include the notion of employees, contractors, third parties, telecommuters, travelers, and other insiders who use these systems.

Read Full Story >>
The story is too old to be commented.