As companies pay more attention to the growing complexity of securing their corporate data, many are realising that traditional security solutions such as firewalls, intrusion detection and antivirus only address a limited extent of the external threats that exist; these threats can come from inside the network as well.
Internal security breaches and malicious attacks are increasing and quickly becoming equally significant security threats as external ones. Hence, IT managers need to be equipped with a means of controlling these internal security risks, and this lies in their ability to manage and control terminal user behaviour.
The most commonly used terminal security management and control system is terminal access control. It enables organisations to prevent terminal users, including PC and notebook users, from becoming the weak points in an organisation, making it vulnerable to security attacks or data breaches.
A terminal access control system checks the security status of terminal users and ensures that users accessing the network adhere to the necessary security status to prevent security violations, and also repairs terminals that are at risk. It is aimed at managing the spread of attacks, protecting the network, and checking the security status based on a user’s ID while providing secure network access control.
Terminal Behaviour Management
While unintentional, PC terminal users are the most common users to violate corporate security policies, which typically include accessing restricted websites, playing games, using instant messaging software, and sharing confidential information through USB interfaces or over the network.
By managing user behaviour, it is possible to check the installation of application software on terminals, monitor processes running on terminals, control USB interfaces such as infrared and Bluetooth, control access to the network, and record file operations onterminals.
With documents, including ones containing sensitive data, being so easy to access and distribute electronically, document security and preventing data breaches is a growingpriority for companies.
A terminal security management solution includes encryption technology which works at the disk drive layer and filters, and encrypts and decrypts files, allowing a user to process specified file formats such as Word documents. This enables the management of the rights of reading, writing, modifying, and printing specified file types through the interfaces provided by the editor.
Without an effective, easy-to-use and secure terminal management solution, organisations are at risk and vulnerable to data loss, data theft and opening confidential information to the outside world and competitors.
Shabir Satar, product manager, Huawei Symantec