Until recently an antivirus system was enough to meet the protection needs of end users from attacks on their terminal equipment. The landscape has now changed, as the end devices except for the common antivirus mechanism require additional protection mechanisms since the risks / threats have changed form and mode of transmission.
The simple antivirus programs do not have the "intelligence" to protect users from "Trojan Horses", "Botnets" and other clever viruses resulting in a dramatic rise of infection outbreaks. Moreover, infections are not always identified by the management systems resulting in neighboring systems’ infection and in the end of the entire infrastructure of the organization. At the same time, the end-user devices do consist only of computers, but also of laptops, smart phones, tablet pcs, etc. These terminals store corporate data, thus leading to increased risk of loss, theft or exposure to non-authorised persons. In addition, terminals are not always located in the organization's intranet but can be anywhere. It is therefore not always feasible to protect the terminals using the existing mechanisms. Numerous vulnerabilities have been created because of the variety and the number of terminals. All these vulnerabilities have been exploited by the attackers thus leading to increasing number of attacks to terminals / endpoints as compared to conventional attacks.
Endpoint Security, Data Leakage Prevention (DLP), Access Control Mechanisms and authentication (AAA), Strong Security Policy Implementation.