Endpoint management
One of the best security defense practices is to ensure that only authorized devices meeting the minimum security requirements connect to the network, including laptops, desktops, mobile devices, and any other end-user device that can connect to a network (electronic circuit boards, and so on). Non-authorized or non-work-related endpoints should go through a guest network with limited access. However, the number of endpoints in the system can make this impracticable to control and manage, hence a need for an automated and policy-based endpoint management system. The primary objectives to have endpoint management as an extra layer of security defense include the following:
- Permission control: With permission policies, you should select the types of endpoints that need to connect to the network—for example, the policy can privilege personal computers with specific characteristics (manufacturer, model, operating system, and so on).
- User access control...