Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security: 6 Questions To Ask Before You Buy: Page 3 of 8

  • The next step is in understanding what your existing security portfolio is and where the endpoint solution will fit in with what you have. Depending on when you purchased your firewalls, intrusion prevention appliances, and authentication servers, you may not want to swap any of this gear out or to buy an endpoint product that duplicates what you already have.

    Some of the products (such as Vernier) come with their own intrusion detection and prevention systems or virtual private network gateways that are part and parcel to the endpoint security solution, while others (such as Lockdown Networks) work with existing IPS, IDS and VPN products. While this is great news if you are in the market for any of these products, realize that your endpoint security will only cover machines that remote users are running and not scan any local network users' machines. To cover both local and remote users, you will need to implement something along the lines of 802.1x authentication.

    Cisco's NAC assumes that all of your Cisco products are running at the most recent versions: if not, then consider going elsewhere unless you want to spend the money to upgrade everything. If you have a significant investment in network switches and routers from non-Cisco vendors, then products that support the other two architectures will make more sense.

    Recommendations:

  • If you don't have a VPN and are looking in that direction, then Juniper and F5 (and to a lesser extent, Cisco and Aventail) provide SSL VPNs with fairly solid endpoint health scanning features. For those of you that have enterprise IPsec VPNs, you are in a better place to implement an endpoint security solution, provided that you are able to run those secure IPsec protocols on all of your local machines too. Most of the endpoint products support this approach, however cumbersome and unattractive it sounds at first.
  • If you already have a workable VPN and don't want to change it now, then consider a product solution that comes with its own 802.1x authentication services, such as Symantec or Infoexpress. You'll need to strengthen your authentication to handle the endpoint health assessment tools mentioned below.
  • If you need to upgrade your switches, both Nevis and Consentry offer their own 48-port switches with integrated endpoint security features.

    3) What on your network are you really protecting?