The Application is the Endpoint
- Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files
- Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes
- It’s time to rethink information security defense around fewer, smarter, yet more effective layers
You have many more endpoints than you think.
How many endpoints do you have on your PC? That might sound like an odd, counter-intuitive question—how could the answer be anything other than one? In fact, the truth is not as straightforward as you might imagine. Fixed applications are under siege—the files that manifest within those applications are just the traveling attack vectors. Applications are the ever-present pathways into your computer—and from there, into the enterprise. Now how many applications do you use on a daily, weekly, or monthly basis? For most of us, the tally can easily reach 10 or more. If you really think about it, each of those potentially vulnerable applications represent its own unique endpoint target.
Read the entire article here, The Application is the Endpoint
via the fine folks at Bromium