The challenge

Un-tethered and non-standard, more and more of the typical organization’s endpoint environment is slipping out of control. Anti-malware solutions are struggling even to protect traditional Windows platforms, and as malware makes inroads into Mac OS/X and Android environments, not all endpoint protection vendors cover them adequately. Bring your own device (BYOD) has created additional headaches for IT security as it confronts threats, compliance, risk of data leakage and access management issues. Enterprises must classify endpoints by type (virtual or physical), native OS susceptibility, business use, risk and management style.  They must then arrange a variety of security mechanisms such as anti-malware, HIPS, disk encryption, device control, NAC, DLP, MDM, eradication, quarantine, re-imaging, forensics and more. Finally, they must select among protection approaches (e.g. network-based, host-based or service-based) for each class of endpoint matrixed against the required mechanisms.

Consulting capabilities

  • Understand a broad spectrum of peer enterprise customer issues concerning malware, BYOD and endpoint protection platforms
  • Offer an objective, independent perspective for your organization
  • Educate or facilitate decisions by an endpoint or mobile security team
  • Assess current state in endpoint and mobile security, map out reasonable and prudent future states
  • Develop an effective architecture and roadmap for all endpoint environment and security components 
  • Specify or evaluate strategies, designs, vendors and providers for managed, unmanaged and moderately managed devices in the IT environments


  • Understand risk, regulatory and cost drivers for endpoint and mobile security
  • Develop guidance on system protection and appropriate use standards and security practices
  • Develop vendor assessment criteria
  • Position organization to address BYOD issues and reduce malware risks to endpoints