Achieving endpoint protection

SANS Institute’s 20 critical security controls

Published June 2015

Today’s technology provides a wealth of opportunity. For example, by adopting bring your own device (BYOD) policies, you can enable your employees to work from anywhere, anytime, increasing their productivity. And the ever-growing volumes of data you collect present opportunities for data mining and business intelligence.

But these market trends also represent security risks, especially given that attacks are increasing in both number and sophistication. Therefore, protecting your environment is a balancing act. Be too lax on security and you incur too much risk. But apply too much security and your users can’t do their jobs. It can seem like an impossible task, especially with limited IT staff and budget.

But it’s not. This paper details how you can protect your environment, from endpoint to perimeter, by understanding the critical security controls needed in today’s complex IT environments and choosing tools that make it easy to implement those controls.