In the world of information technology (IT), an endpoint is any device (be it a laptop, phone, tablet, or server) connected to a secure business network. When you connect to a network, you’re creating a new endpoint. In a perfect world, employees in the office and working remotely (through a VPN, for example) should be able to log in and get their job done safely, but that isn’t always the case.
Every endpoint is a soft spot that cybercriminals can take advantage of and gain unauthorized access to the network. It could be through an exploit, phishing attack, spyware, Trojan, malspam, or other forms of malware. Endpoint protection is the business of hardening endpoints against potential cyberattacks.
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of laptops, tablets, mobile phones, Internet-of-things devices, and other wireless devices to corporate networks creates attack paths for security threats.