HOffice ProServ
Merging cybersecurity best practices with today's flexible home office staff
Endpoint Security: Corporate & Personally Owned Devices
Endpoint systems are those gateway and productivity devices between the tangible user and intangible data. It is important to remember that at the core of data integrity, confidentiality, and availability is the non-technical piece - the human. When working with technical devices, we find that there are three general things that the user wants from their device: 1. Ease of use; 2. Reliability and; 3. Control. Merging these desires into an effective and acceptable security program can prove difficult but can be managed... for the most part (remember that you can't please all of the people all of the time).
In the search for facilitating end user comfort and their ability to properly handle business data, companies have two different options when it comes to end user devices: Corporate-owned and bring-your-own-devices (BYOD).
Endpoint Security: Corporate-owned Devices
Devices that are purchased by the business and issued for business use. Traditionally, corporate-owned devices were stringently controlled both physically and logically; however, as lines become more flexible, corporate use finds itself working alongside personal use.