Feeds

What is the point of End Point Protection?

How we should be protecting our PCs

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Security threats have existed for almost as long as computers have been around.

Few interactive systems can claim to be immune – even venerable systems like the IBM mainframe, UNIVAC and VAX have had their share of malware. Then, the PC brought computing to the masses, but also brought a new environment for malware to bloom.

The ‘sneaker net’ at first kept the rate of spread at a relatively low level. However, once networking, and especially the Internet, became pervasive, threats began to spread rapaciously.

The initial generations of malware focused on publicity or damage, with the main financial costs coming from lost productivity and the subsequent clean-up and potential for damage to the brand and reputation of the company. The rise of online shopping and commerce, and social identities have created a new target for malware creators that is financially motivated – bringing in organised crime on a huge scale. When we look at how virtualisation is changing PC use, and how quickly threats evolve, how should we be looking to secure not just our PCs, but also the users that most often really are ‘the weakest link’?

Starting with those end-users, education and policy remains a continued weak point in IT, and especially PC, security. From writing down logins and passwords, sharing logins, emailing or copying sensitive information - not to mention clicking on attachments to emails promising a nice eyeful or that somebody loves them – the habits of PC users often have the biggest impact on the effectiveness of any security solution.

Unfortunately, the attitude of end-users to security is often laissez-faire, and this comes from the culture of the company and its attitude to security and the investment put into training users to be security conscious. We can see from the figures below that for many companies, raising the level of security is far from top of mind. To close the loop and improve security overall, there is almost no better place to start from than getting management to realise the implications of security breaches, and to develop a security policy that can be communicated to the workforce.

It is vital that users are educated to be aware of and understand the security implications of their actions. Few people would sticky-tape their keys to their car after all, even a company car, as the consequences would be pretty severe. Yet this is effectively what they do when providing access details for critical business systems with little or no repercussion.

It is important to realise that traditional methods of protection are not going to suddenly become irrelevant. Anti-malware software will continue to be necessary to cover much of the mature threat landscape. New techniques, such as content filtering, data protection and web protection may enhance and augment these systems, but they are extending and not replacing the functionality.

With the security threat moving from damage and notoriety to identity and money, the perpetrators are looking at ever more covert ways to operate, and are moving off the PC and onto the web. This brings a huge security space to cover and is much broader than trying to protect individual PCs. This will bring about a change in security protection where network or Internet-based security services work alongside those running on the PC. This is starting to become well established as a concept, especially for malware such as anti-spam, and is starting to gain relevance for web content and financial interactions.

We are also likely to see a change in how vendors architect security solutions, and this will affect how they are deployed on PCs. This change is being driven by virtualisation, which is throwing a spanner in the security works. With multiple Operating Systems (OSs) running, just where and at what level should security software really be functioning? Running full-blown security solutions on all virtual machines is inefficient, a resource hog, and requires management to avoid conflicts and redundant processing.

For type 2 hypervisors, where guest OSs run on top of a host OS, few products - if any - are capable of securing guest OSs from the host OS. And where the guest runs directly on a type 1 hypervisor, products have yet to emerge that can act as a sentinel to provide centralised, low-level security.

The ideal solution will be to have a thin security layer, or ‘client’ for each virtual machine that then communicates with a ‘server’ running on the host OS or in conjunction with the hypervisor. The security scanning and processing can be co-ordinated, and common elements shared for maximum efficiency. The trick will be getting up and running with these emerging solutions in parallel with the move to deploying virtualisation on PCs. Leaving it too late will very likely result in a wholly unsatisfactory user experience, and an unmanageable security soup. ®

Beginner's guide to SSL certificates

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.