End Point Security Choices

The question that has troubled many security administrators is, "What is endpoint security?" Is it Network Access Control? Or is it controlled through desktop security products like firewalls and policy engines, or by user access and authentication technology? In reality, effective endpoint security relies heavily on all of these ingredients, and the ability of solution providers and system integrators to make it all work together. In this video, eWeek Channel Insider Technology Editor Frank Ohlhorst explains that all security failures, compromises and infections can be traced to an endpoint. For something bad to get in it has to come from an access to the network, via a PC, a smartphone, a laptop, or other device, plugged in remotely or locally. So if administrators can control the endpoint, they can control the security of the entire network.