eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1Servers Require More—and More Specific—Security
When it comes to securing these two types of systems, more broad-based policies and controls can be applied to laptops. However, servers require specific policies and controls based on the data, application functions or the environment in which it resides. Servers by nature are set at “default deny.” However, laptops maintain a “default allow” setting.
2Servers Are Housed in Data Centers, Laptops Are Everywhere
Since servers connect to a multitude of computers, they are exposed to more threats than laptops. Servers present higher-value targets, whereas laptops (which connect to a single endpoint) present a somewhat lower value target. Thus, IT managers should implement reputation-based techniques to identify malware and mitigate risk.
3Different Usage Means Different Security Schemes
Because they have a standard operating system and applications, most laptops behave the same. Servers, on the other hand, have a diverse set of business functions as well as different workloads. A server generally performs singular tasks for many purposes, and its value to an organization is higher than a single laptop that performs multiple tasks for one person in an organization. Thus, a laptop maintains lower value. Servers require log monitoring to enable organizations to meet compliance requirements; laptops do not. Be sure that the security system you select can be protective in these areas.
4Consider Deploying Multiple Layers of Security
For laptops, in particular, consider implementing reputation-based techniques to identify malware and mitigate risk. If possible, also use Web gateways armed with malware-detection capabilities to prevent socially engineered attacks. Virtual private networks are sometimes difficult to handle, but they generally do their jobs.
5Use Data-Loss-Prevention Tools
6Keep All Software and Security Patches Up-to-Date
7Obviously, Fewer Users Means Tighter Security
8Monitor, Monitor, Monitor
9Watch and Limit Network Traffic
10Keep Up With the Latest Security Products
Hackers and security providers are constantly playing cat-and-mouse. But the hackers generally stay ahead of the game. Keep in the loop on trends, new products and use cases by checking in regularly with key vendors, analysts and publications such as eWEEK to find information relevant to your system.