What are organizations and vendors doing to provide for the security of systems behind the Internet perimeter?Host security can be broadly defined in a comprehensive host security system that encompasses configuration management, virus scanning, host intrusion detection/protection, and firewall capabilities. However, the deployment of these technologies may still fail if not updated or improperly configured. Thus, organizations are looking to validate host/endpoint security through checking the correct configuration and operation of host security controls before allowing connections to internal systems. When the workstation connects, whether attached directly to the corporate LAN or remotely via a VPN tunnel, endpoint security verifies that the system is hardened, properly patched, running up to date anti-virus software, and that the host firewall is up and running with the proper rulebase before allowing it to connect to the internal network.The validation of security controls is being done today by vendors such as Sygate and Zone Labs through open integration with networking vendors such as Enterasys, Nortel, and Cisco. There are currently several large organizations that are working with these vendors to validate endpoint security in their enterprises. Recent announcements from Cisco and Checkpoint further validate the market demand for endpoint security.Cisco has recently announced Network Admission Control, with support from leading vendors such as Network Associates, Symantec, and TrendMicro. However, this solution is not in place today. Cisco NAC is built upon proprietary technology that will require network infrastructure software upgrades, lacks openness, a breadth of operating system support, and is futuristic with promises for code to be released in mid-2004. With the infrastructure support for NAC so far off, it will be 12 to 18 months before infrastructure code is upgraded and we begin seeing adoption of NAC solutions. While Cisco offers host intrusion protection today, it is not the complete solution that organizations are looking for today and does not extend to the validation of the configuration of the system and its security components. The announcement of Check Point’s plan to acquire Zone Labs further validates the market for endpoint security. Through this acquisition Checkpoint will have a broad and complete firewall solution from the gateway to the endpoint. This will allow organizations to define and centrally manage security policies from the perimeter to the desktop. The challenge for Check Point is that the responsibility for this breadth of offering may fall within different IT domains. Often the network team is responsible for network and firewall security while the systems administrators are responsible for host security controls.Endpoint security is here today, and it is more than personal firewalls and anti-virus. Organizations looking for endpoint security solutions should evaluate the offerings from Sygate and Zone Labs. These, when combined with other security agents such as anti-virus and intrusion prevention, offer robust solutions validating the secure configuration and operation of endpoints. Organizations feeling the business impact because of insecure endpoints, waiting 12 months or more to develop an endpoint security strategy should be approached with caution. However, those few who already have a strong handle on security configuration management and validation of security controls on endpoints may want to wait as this market irons itself out over the next year. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe