ransomware

For a long time, protecting the IT perimeter meant throwing up a barrier on your network, preventing, or at least attempting to keep outsiders at bay. It was relatively simple, for the most part, it was one access point in one location to protect.

Today’s IT Perimeter

Today that IT perimeter has expanded, today that same IT perimeter includes all endpoint devices (and their mobile network access points) including those conveniently mobile laptops workers take to meetings, to their homes or in some cases, leave in their cars. While mobility is a great business tool at the same time it creates easy opportunities for data breaches. With all these new access points, protecting the perimeter had become an exponentially more complicated exercise for CIOs.

Adding to the problem, is that malware has become more malicious making it harder for IT to detect attacks and contain them, allowing attackers to get through the perimeter despite security measures.

Clearly, IT can no longer rely on security products alone to protect their products. This is where specialist solutions like endpoint backup and protection software suites come into play. These solution work by protecting each endpoint device through agents installed on them.

In the case of Cibecs, these agents are remotely installed and set up by IT to protect the device in a number of ways, including:

1. regularly and automatically backing data so that it does not only exist on the device,
2. encrypting that data so that only authorised users can access it, and
3. enabling data loss prevention technologies that allow IT to revoke access to files or to remotely wipe the data from the device.

With an endpoint backup and protection solution in place, an extra layer of protection is added to the IT perimeter, so that even if there is a breach, the data on the device is protected, recoverable and can be completely removed so that data cannot be stolen.

Taking into account every laptop in your business, do you really know how secure your IT perimeter is?

Discover the 7 Must-Haves of Endpoint Data Protection, access your free report here.


To see how quickly and easily Cibecs can protect all the endpoint laptops and computers in your business watch the short demo here.

FEATURED POSTS
IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers of 2016 Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions of 2016 by CIO Review. The list, compiled by industry insiders, highlights leading global…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Discover how easy endpoint data protection can be