Endpoint Security
by Jeremy Robinson - Monday, 31 December 2007.
Author: Mark Kadrich
Pages: 384
Publisher: Addison-Wesley Professional
ISBN: 0321436954




Introduction

Endpoint security is currently one of the "hot topics" in the information security market. Often neglected, this vital part of your company network organization can very quickly turn into a nightmare. In this book, author Mark Kadrich tries to provide a comprehensive endpoint strategy that works.

About the author

Mr. Kadrich, CISSP, is president and CEO of The Security Consortium. Publications contributed to include TCP Unleashed, Publish Magazine, Planet IT, RSA, CSI, and The Black Hat Briefings.

Inside the book

The book opens with a chapter that deals with the basic information surrounding your computer network's perimeter where the reader can get refreshed with the important points related to different endpoints. The author briefly discusses the types of endpoints, but this is just an introductionary piece as later parts of the book cover them in details. What follows next is a rather interesting three-chapter section where Kadrich presents the security issues, gives his perspective on the missing link and finally proposes a solution through the way of central proportional control.

Throughout the book the author focuses on his point of using a closed loop process control and how the endpoints need to work with the network for the optimum state of complete security. There are quite important things to keep on mind when choosing endpoint security systems from different vendors, so Kadrich presents the key points of product evaluation.

The final part of the book hosts technical and practical information on different type of endpoints: Windows, Mac OS X, Linux, PDAs, Smartphones as well as various embedded devices. Each of the chapters focuses on special points of interest, as well as specifics such as checking the current state of security, hardening and using invaluable third party applications.

Final thoughts

The author shares some good information on powering up the state of your endpoint security, but overall the book could have been organized much better than it is. On the other hand, I liked the way Kadrich covered endpoint topics in general while providing useful information on third party commercial and open source solutions. The case studies that close the book were a bit too short, but surely can act as a good material for showing the decision makers the importance of a good endpoint security strategy.

The book is focused on Kadrich's approach to endpoint security with a focus on using NAC technology, which will definitely turn some people off.



Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //