Endpoint Security: Merging HOffice Equipment & Business
Endpoint systems are those gateway and productivity devices between the tangible user and intangible data. It is important to remember that at the core of data integrity, confidentiality, and availability is the non-technical piece - the human. When working with technical devices, we find that there are three general things that the user wants from their device:
​
​
Merging these desires into an effective and acceptable security program can prove difficult but can be managed... for the most part (remember that you can't please all of the people all of the time). In the search for facilitating end user comfort and their ability to properly handle business data, companies have two different options when it comes to end user devices: Corporate-owned and bring-your-own-devices (BYOD).

Corporate
Devices that are purchased by the business and issued for business use.
BYOD
Devices owned by individuals used to process business related data.
The objective of this section is to identify baseline controls and considerations that can be applied to both types of devices. Remember that at the forefront of the listed controls is protection of business data and that the cost of end devices pale in comparison to the data that drives the business. Traditionally, corporate-owned devices are stringently controlled both physically and logically; however, as lines become more flexible, corporate use finds itself working alongside corporate use.

