Infosec Cloud
Solutions. Services. Training.

March 2015 Update

We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure.

A Simple Definition: ‘What is an ‘Endpoint’?

Jargon abounds in the technical world of IT, with obscure-but-precise language sometimes getting in the way of conceptual understanding. The term endpoint fits the bill. While it may make sense to a seasoned IT professional, the rest of us may need a little help. What exactly is an endpoint? Why does it matter?

According to Wikipedia, “endpoint” is a hardcore punk band from Louisville, Kentucky. A more common definition for endpoint in computer networking, architecture, and operations, however, is a mobile device such as a laptop, phone, or tablet.

The term has its origins in reference to computer networks. The endpoint is a device or node that is connected to the LAN or WAN and accepts communications back and forth across the network. In a traditional sense, an endpoint can be a modemhubbridge, or switch. It also could be data terminal equipment (such as a digital telephone handset, router, or printer) or a host computer (such as a workstation or a server).

Yet today endpoint is used most commonly in network security and end user mobility circles to mean any device outside the corporate firewall. That could be a laptop, tablet, or mobile phone on the “edge” (or periphery) of the network and which individuals connect to the central network.

Endpoint use is increasing in the business world due to workforce mobility, by which I mean the rarity that you’re ever in your office, much less tethered to a desk. Traditional network-focused protocols are designed for the PC-era and the desktop. With over 30% of data outside the firewall on endpoint devices, IT needs to deal with security and communications in real time, across varying locations and bandwidths, with possibly insecure apps loaded on an ever-increasing number of devices, with consistent exposure to malware across Internet protocols.

IT teams solve the challenges of endpoints using a variety of technologies (such as virtual private networks, VPNs) that enable safe connection to the main, managed network. Cloud endpoint backup technologies (like Druva!) also enable real-time backup of the data on endpoints, minimizing the risk of data loss. They also give IT tools to manage corporate data on endpoints, such as the ability to remote wipe and create a trusted data store in the cloud.

Ironically, endpoints are fast becoming a more common way to compute and communicate than the local, fixed machines from which they were derived. The notion of a safe and secure network and insecure endpoints is fast giving way to a more modern concept: that of computing across any device or network, with always-on security protecting companies and users across local and cloud-enabled storage.

Jennifer Burnham,
Director, Communications and Content, Druva.


Defining the Next Generation of Secure Web Gateways

Peter Firstbrook, Research VP, Gartner

Watch this short video to find out:

* What are the most disruptive changes impacting the Secure Web Gateway?
* How have mobility and mobile applications changed the criteria for secure web gateways?
* How have public cloud and consumer services changed what businesses need to look for in a Secure Web Gateway solution?
* What do today’s advanced threats mean to the evolution of the Secure Web Gateway?
* What role will security intelligence play in advanced secure web gateways?

Criteria important to evaluating next generation secure web gateway solutions:

1. Effectiveness in detecting new and unknown threats.
2. Capability to protect the organisation at all stages of the security lifecycle
3. Application control
4. How mobile devices and the new mobile environment are handled


For more information or impartial advice, please
email: [email protected] or call 01256 379970

Gartner Magic Quadrant for User Authentication:

SecurEnvoy positioned furthest and highest in completeness of vision and ability to execute in Niche Players Quadrant

Gartner recently published a new “Magic Quadrant for User Authentication” (Ant Allan, Anmol Singh, Eric Ahlm; 1 December 2014).

The Report states: “The market is mature, with several vendors offering products that have been continuously offered during the past three decades (although ownership has changed over that time). However, new methods and vendors continue to emerge, with the most rapid growth occurring within the past decade in response to the changing market needs for different trade-offs among trust, user experience (UX) and total cost of ownership (TCO).

The greater adoption of user authentication over a wider variety of use cases, the impact of mobile, cloud and big data analytics, and the emergence of innoovative methods continue to be disruptive.”

Gartner Magic Quadrant for User Authentication image

SecurEnvoy, the inventors of tokenless two-factor authentication (2FA), were recognized for their completeness of vision and ability to execute.

Considering the criteria used by Gartner, we believe this constitutes real recognition of the British developer’s user-friendly authentication systems, which are well established on the market.

SecurEnvoy is the developer of the SecurAccess phone-as-a-token platform. The server-based software does not require a dedicated hardware token but uses existing mobile devices as a second factor. Users receive the numeric passcode (one-time passcode, OTP) required for logging in via SMS or via an app on their smartphone, tablet or laptop. The OTP is then combined with the user’s personal login details in order to obtain access.

As an alternative to the SMS method, SecurEnvoy has also developed another reliable option that does not need mobile reception: One Swipe technology, used together with a soft token app, enables passcodes to be sent via QR codes.

Click here to email Infosec Cloud to request your free copy of the Gartner report.


Office 365 offer:
13 months for the price of 12

Click here to see our discounted pricing.

Our Office 365 offerings are exactly the same as those found on the Microsoft website and hosted in the same Microsoft data centres – but with 4 major benefits – making Infosec Cloud the number one choice to purchase Office 365.

We offer flexible, discounted prices, free migration and full ongoing support.


Aerohive Webinar: BYOD and IoT – How To Manage And Secure More Devices On Your Wi-Fi

Register to qualify for a free access point!*

Date: 12 March 2015 Time: 11:00 GMT

The webinar is for IT professionals looking to learn, implement or expand wireless networks in their organisation.

The webinar will cover:

* The role of 802.11ac in networks today and tomorrow
* Balancing flexibility and security through context-based network access
* How context-based networking is the key to performance

Click here to register >>

Qualification Criteria


  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks