Guide to Buying Managed Endpoint Security Software

It’s a given that any computer that needs Internet access also needs protection from the all the viruses and various other forms of malware it will inevitably come in contact with. Protecting a single PC from myriad of online threats can be enough of a challenge these days, but the job can get a lot harder when you’re dealing with a large number of desktops and/or laptops on a corporate network.

When you need to protect a lot of client systems, a managed endpoint security product can provide centralized configuration and monitoring capabilities that you won’t find in stand-alone anti-virus or more comprehensive Internet security software. Here are some things to consider when looking for a managed endpoint security product.

Protection Features

At a minimum, all endpoint security products provide basic anti-virus and anti-spyware protection. For the best protection against unknown or emerging threats, look for a product that supplements standard signature-based detection with heuristics and behavioral analysis.

Endpoint security products frequently offer a laundry list of other security features as well. These can include a firewall, spam control, intrusion prevention, DLP (Data Loss Prevention), a VPN client, and disk encryption, as well as things such as control over access to the network, applications, and devices like removable storage drives. These are great features to have if you need them, but since features are frequently bundled together, they can needlessly drive up complexity and cost if you don’t. Look for a product that lets you choose the specific features you require up front but still gives you the option to add additional ones later if desired.

To keep deployment and administration as simple as possible, products should preferably use a single client software agent and management console regardless of how many features you opt for.

Management Console

The cornerstone of any managed endpoint security product is its centralized management console used for command and control, but they’re not all the same. Consoles that are application-based will only work with specific operating systems, and they must also be installed on each computer you want to use to administer the product. Browser-based consoles, on the other hand, run on an included Web server (or in some cases one you may already have, such as IIS) and allow you to install the console once and access it from any system on the network.

With either type of console, take heed of its system requirements, particularly if you don’t intend to run it on a dedicated system (consoles can sometimes run on any available workstation PC, or they may need to be run from a proper server). The CPU, RAM, and storage needs of some consoles can be considerable, which needs to be taken into account if it will need to run alongside other programs.

Platform Support and Client Deployment

Platform support isn’t a big concern when you’re dealing with a lone PC. The software either supports the system’s OS or it doesn’t, but it can be a major issue when you have a heterogeneous network with multiple versions of Windows (including 32- and 64-bit varieties), perhaps a handful systems running MacOS, Linux versions, or other operating systems, or virtualized environments. Be sure the product you choose doesn’t leave any of those systems out of the loop.

Then there’s the matter of how to get the client software onto all of your systems. A managed security product should offer multiple deployment options, including, ideally, the ability to automatically push software to clients and perform a silent install, preferably removing any existing security software in the process. A lack of push capability, however, and leave you to rely on a conventional distribution method like a shared network folder or third-party tools to deploy the software.

If you have a lot of remote systems – such as telecommuters or mobile workers who are frequently off the network – you’ll want a way to deliver the software to those far-flung systems, such as the ability to generate emails containing the appropriate download links.

Client Configuration and Updates

Most managed endpoint security products get you up and running with a set of predefined security policies, but you’ll want to make sure any product you choose lets you easily modify those default policies or create new ones without plunging you into a morass of rules and settings. Also, since security policy is seldom a one-size-fits-all affair, look for a product that lets you customize policies for particular systems, users, or groups.

Back to the issue of remote systems. It’s a good idea to make sure they’ll be able to obtain regular program and definition updates from the manufacturer’s servers as well as from yours since they won’t always be connected to the latter. Moreover, you should be able to configure policies based on location, so that, for example, Windows file sharing can be allowed on the corporate LAN, but not when the system’s connected to other networks.

Logging and Reporting

The whole point of managed security is to know what’s going on with your network, so a product’s logging and reporting capabilities should factor prominently into your decision.

It’s easy to wind up with a case of information overload due to the sheer volume of data a managed endpoint security product can collect about protected systems. A dashboard view with charts and graphs that provide critical info (such as recent infections and out-of-date systems) at a glance is a good start, but it should also be customizable and not simply report information in aggregate – it should be easy to drill down for detailed information on a specific item.

Also, make sure that logs are updated in a timely fashion; with some products you may have to wait several minutes or hours for the latest activity to be visible. It’s also important to consider how far back logs retain data for when you are trying to spot historical trends.

Here’s a list of endpoint security products you can consider, most of which are for trial periods of up to 30 days:

Avast! Standard Suite

AVG Internet Security Business Edition 2011

Check Point Endpoint Security

Comodo Endpoint Security Manager

ESET NOD32 Antivirus/Remote Administrator 4

McAfee Endpoint Protection Suite

Panda Cloud Office Protection

Sophos Endpoint Security and Data Protection

Symantec Endpoint Protection v 11

Microsoft Forefront 2010

Trend Micro OfficeScan 10.5

Joseph Moran is a veteran technology writer and co-author of Getting StartED with Windows 7 from Friends of Ed.

Keep up with security news; Follow eSecurityPlanet on Twitter: @eSecurityP.

Top Products

Related articles