What endpoint management includes
The meaning of endpoint management is not merely the installation of a single piece of software; it’s a comprehensive approach to proactively hardening endpoints, maintaining full visibility into activity, and efficiently detecting and remediating threats. This resilient security posture is built on several pillars:
Device inventory and visibility
You can only protect the devices that you know about. Organizations need a real-time, exhaustive list of all devices that interact with the network and apps (like SaaS). Enterprises often manage hundreds to thousands of devices across laptops, IoT devices, servers, mobile devices, and others. A large percentage of these devices go unmanaged. These visibility gaps introduce significant risk.
Patch and application update management
A regular, automated patching cadence is essential to remediate critical security vulnerabilities in operating systems and applications before attackers can identify them.
Security policy enforcement and configuration control
It’s not enough to have security policies; organizations must have a mechanism for enforcing them to prevent “configuration drift.” Small, undocumented changes can creep in over time due to employee turnover, software updates, or troubleshooting that disabled a configuration and forgot to re-enable it. Every device must maintain the same standardized settings and standards.
An endpoint security posture management (ESPM) tool performs a continuous audit of endpoints to detect missing patches, risky configurations, unauthorized software, and other security risks.
Monitoring device health and risk
In endpoint security management, device health helps determine risk. Ensuring that software is updated and properly configured and all policies enforced hardens endpoints’ defenses against threats. The other half of managing risk is ensuring the proper detection tools are in place. This includes having antivirus (AV) or next-gen antivirus (NGAV) installed on every endpoint to prevent known malware from infecting the machine. While these tools are an essential foundational layer, they aren’t always capable of detecting polymorphic, custom, or fileless malware.
Today’s sophisticated threats mean that a breach has to be treated as inevitable. A defense-in-depth approach layers defenses to maximize resiliency if any single control fails. This requires tools that monitor behaviors to detect indicators of compromise, including identity threat detection and response (ITDR) and endpoint detection and response (EDR). ITDR focuses on detecting and responding to identity-based threats, such as signs of account compromise (e.g., impossible travel, unusual privilege escalation). EDR detects malicious behaviors like establishing persistent footholds, dumping credentials, and living-off-the-land (LotL) techniques. These tools can help isolate the endpoint or account to contain threats before they spread across the network.