Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Information Unleashed

Endpoint Security: An Ounce of Prevention

Created: 30 Mar 2012
CJ Desai's picture
0 0 Votes
Login to vote


When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information in one place. As virtualization and cloud-based storage increase, there are more potential weak points for cybercriminals to attack.

In addition to having more endpoints to manage and support, traditional safeguard are no longer enough to protect you from current threats. The sheer number of malicious threats being developed is overwhelming, and the cost of failing to apply sufficient security is significant. A recent Symantec survey revealed that on average, organizations incurred nearly half a million dollars in losses over the last year just from endpoint attacks. It’s no surprise that the most secure businesses are those that are employing comprehensive computer security software.

The survey also demonstrated that the businesses that adhere to best practices are the ones better prepared to weather the storms of cyberattacks. They keep all their endpoints up-to-date with the latest software, use antivirus/spyware protection, deploy firewalls and implement other technical safeguards to prevent data leakage. Moreover, they provide security training for their employees. By taking a proactive approach to create a more comprehensive security posture, organizations that employ best practices are less affected by cyberattacks, experiencing only a fraction of the downtime that less diligent companies have to deal with.

While the frequent reports of business information theft can be worrisome, it’s important to remember that there’s a lot you can do to minimize your risks. Taking the initiative to employ best practices will improve your confidence and allow you to quickly respond to any situations that arise. In security, an ounce of prevention truly is worth a pound of cure.

Download Symantec’s 2012 Endpoint Security Best Practices Survey at (PDF) or view the SlideShare presentation at: