Many savvy business managers understand the importance of protecting customer contacts, invoices and databases with security measures that keep them safe from external intrusion. Increasingly, business opportunities take your work outside the layered security inside your office. Maintaining a competitive edge means you need an array of laptops, smartphones, slates or tablets with access to public networks on all of them.
But out there, away from the protective security umbrella of your office, these devices are vulnerable if not protected and secured.
- Internet-borne attacks can launch viruses, malware, phishing and spam which can easily spawn on public networks.
- Some of these may even remain dormant until you reconnect to the office network, opening a portal for hacker intrusions.
To extend the reach of your business security, an endpoint strategy helps protect your end-user devices. Simply put, endpoint security is a strategy that assumes each device (the endpoint) is ultimately responsible for maintaining its own protective integrity. Most often these measures use software loaded on the endpoint device, and ideally, are managed centrally.
Essential Security 101: User Identity
The first level of protecting these devices from unauthorized access is simply incorporating user identification security. You most likely already require user identification and password for access inside your office network. So incorporating the same or similar protection on your endpoint devices protects your business from unauthorized access and prying eyes.
For more controlled access and better protection in the event of a lost or stolen system, you can incorporate hardware security. Fingerprint readers or smart cards tie the device directly to the user.
Many Dell Latitude and Vostro laptops use optional fingerprint reading technology to protect the computer, acting much like a door lock.
- Before the computer will boot, it will read your user’s fingerprint and if it matches, will act like a key and open the system.
Additionally, you can manage device access by requiring the user to insert a removable smart card prior to access.
Threats never sleep, but you can
A hacker can launch cyber-attack intrusions over the internet anytime one of your systems is connected to the internet. They can even peek inside your device from an unprotected public access network. But you can relax, if you are using a local-based security software package.
Dell helps small business that may not have full-time or in-house security personnel implement Trend Micro Worry Free business security services for endpoint systems. Trend Micro™ can
- Scan documents, devices and external access for malware or viruses and help protect against unauthorized external access.
- Automatically manage security updates from the office or on the road, essentially wherever you have (or need) internet access.
Lock your data even when it’s gone
Are you confident that your data is really secure when you walk away? You should protect information by encrypting the data on the hard drive or removable USB devices. For example, Dell Data Protection and endpoint encryption provides file-level encryption support that you can customize according to business needs, user, group or operating system.
And should your devices be stolen or lost, you should have a means to track and retrieve the system, and optimally the data. With Dell System Track, your missing device will send notification the next time it connects to the internet. Dell services can work with local authorities to help you locate the device. You can even erase the data from the stolen system over the internet if it gets connected with the help of Dell remote data delete services.
Find the right security pro
By far, the best strategy is to create a strong alliance with a trusted technology partner. To help businesses stay ahead of security threats, Dell has developed a comprehensive set of security measures, from endpoint to back office. You can even easily manage deployment, updates, security compliance or patches with management appliances, including device discovery, software distribution and asset management.
Discover how Dell products and services can help you create an envelope of security around from the field to the file. Contact a Dell representative or visit the Dell Learning Center for more information.