The speed at which technology grows, changes and adapts is incredible. These days, the average person has three devices connected to the internet – that’s the average person. Most of us have many more than that.
This presents a problem. When connected to a network such as your workplace’s, these devices (laptops, computers, smartphones, tablets, etc.) are known as ‘endpoints’. This comes from the fact that they’re the ultimate way the network is used and accessed.
They’re also the most vulnerable part of a network. If an employee working on a laptop from home accidentally clicks on the wrong link without the proper protective measures, your entire network may be vulnerable to a cyberattack.
The vast number of personal devices results in what’s known as ‘endpoint complexity’ – keeping track of, and securing, an array of different personal and corporate devices. As you’d expect, the bigger the organisation and the more endpoints there are, the more challenging managing endpoint complexity becomes.
So, what can you do about it? And how can your employees work from home or the office without presenting a dire security threat?
Develop a clear endpoint management strategy
As always, prevention is the best cure. Planning ahead means you’ll have a much better chance of avoiding problems, cutting them off at the source before they develop.
An endpoint management strategy should cover everything mentioned in this article, including endpoint management solutions, training, scans and audits, and automation.
It should be for your end-users (typically your staff, but perhaps also suppliers, customers, or other stakeholders).
It should also be clearly worded and, ideally, jargon-free. With this last point in mind, ‘Endpoint Management Strategy’ may not be the best name for the document you share with your staff. Mobile Devices Policy or something similar may be a more appropriate name.
Implement endpoint management solutions
As their name suggests, endpoint management solutions control endpoints and how they function, rather than controlling the access to the network. They normally operate on the assumption that if an endpoint is secure, the network to which it connects is safe to connect to it. In more modern implementations using zero trust network access (ZTNA), the endpoint management solution will attest the posture of the endpoint to the platform, and will then check the user identity to verify the user has the right to access the system.
There are many all-in-one endpoint management solutions available, and most offer the following functionality:
Central management, monitoring and reporting
This function provides centralised control over security policies and settings across all endpoints. It allows administrators to remotely configure, manage and monitor endpoint security agents, and receive real-time alerts on security incidents. It also enables administrators to generate reports and analytics to gain insight into the security posture of their organisation’s endpoints.
Endpoint security agent
This is a software program installed on endpoints to protect them from security threats. The agent typically includes a range of security features, including antivirus, anti-malware, firewall, intrusion detection and data encryption. It may also include advanced features such as behavioural analysis and machine learning to detect and prevent new and emerging threats.
Policy engine
A policy engine is a core component of endpoint security management that allows administrators to define, configure, and enforce security policies across endpoints. The policy engine enables administrators to set rules for user access, data protection, and network security, and ensures that endpoints are configured according to the organisation’s security standards. It also enables administrators to automate security tasks and workflows, such as software updates and patch management, to reduce the risk of security breaches.
Use automation to streamline endpoint audits and updates
Use carefully constructed (secure) prompts to automate certain processes, such as audits and updates.
For example, rather than having employees conduct their own scans, have the endpoint management platform trigger the scans automatically. You could also implement certain ‘kill switch’ features, where the device automatically disconnects from your network when an endpoint management solution deactivates, or a threat is detected. However, this does create problems with remediating the devices and getting them back online properly.
A better approach is that when a device is identified as ‘non-compliant’ the platform automatically revokes its access. This can be achieved in a variety of ways, wither by your ZTNA blocking app access, or your network access control moving the non-compliant user to a remediation vlan.
Automation also shouldn’t take away from your staff members’ responsibilities of watching for threats and keeping their devices safe.
Provide employee training and education
Employee training and education are vital for endpoint security and management. Ultimately, they’re responsible for keeping your network safe and secure.
Employees should know how to operate the basic features of their endpoint management software, including which devices are allowed to access it and which aren’t. This should be detailed in the endpoint management strategy. When it comes to your VPN, all connections should be automated, so users don’t need to choose when to use it, but it automatically comes up when needed. Your users will however, need to understand when it hasn’t worked in order to get support. Mainly, though, users need to recognise something suspicious and choose to not click link, open email or visit websites that may be malicious.
This is particularly vital with new staff during the onboarding process. You should provide regular training to ensure these processes are remembered.
Conduct regular endpoint audits and updates
The advantage of giving your employees work laptops, phones and other devices means you have much better control over their security.
As a term of use, staff should be told that their devices will be scanned regularly. This must include security checks, audits, and OS and driver updates.
Doing this will keep your system secure and ensure threats don’t make it into your network.
Implement BYOD controls
For users who use their own devices to access a corporate network, putting the right protections in place is vital.
A bring your own devices (BYOD) policy can establish standards for the devices that are allowed to be used in the workplace. This can help reduce the complexity of managing a wide variety of devices and operating systems.
It should require that all devices meet certain security standards, such as having a password or encryption. This can help protect sensitive data on the devices and reduce the risk of a security breach.
And it should also require that employees install management tools on their devices, such as mobile device management (MDM) software. These tools can help your IT team manage and monitor users’ personal devices remotely, reducing the need for manual intervention.
It’s also essential to offer your users a standard experience, regardless of where they are accessing your networks from, to help them more easily recognise when something is amiss. For corporate devices, this should include a small, standard set of device choices, where all devices behave in the same manner. For BYOD devices, there should also be a common approach, such as allowing only Android and iPhone devices.
This will help ensure the same policies are applied, regardless of the end user device, and makes support easier too.
How AMDH Services can help you manage endpoint complexity
As we mentioned, an effective management strategy is the most crucial step in endpoint security. By keeping all devices secure and eliminating any potential threats before they arise, you have the best chance of keeping your system safe.
Of course, your strategy must also include a disaster recovery plan.
Based in Derby in the East Midlands, AMDH Services specialises in strategy development and implementation. We’ll work with you to find the best (and most budget-friendly) approach you need.
Take steps now to future-proof your organisation against cyberattacks.
If you’d like more information on AMDH Services and how we can help, please don’t hesitate to get in touch. We offer a commitment-free, friendly chat to learn about you and what you need.
Use the form below to contact us! We look forward to hearing from you.


