Visible to the public Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat

TitleEndpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat
Publication TypeConference Paper
Year of Publication2019
AuthorsChandel, Sonali, Yu, Sun, Yitian, Tang, Zhili, Zhou, Yusheng, Huang
Conference Name2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
KeywordsCollaboration, Data Breach, data leakage, Endpoint detection and response, Endpoint protection, Endpoint protection platform, Human Behavior, insider threat, Metrics, policy-based governance, privacy, pubcrawl, resilience, Resiliency
AbstractWith the increase in the incidences of data leakage, enterprises have started to realize that the endpoints (especially mobile devices) used by their employees are the primary cause of data breach in most of the cases. Data shows that employee training, which aims to promote the awareness of protecting the sensitive data of the organization is not very useful. Besides, popular third-party cloud services make it even more difficult for employees to keep the secrets of their workplace safer. This pressing issue has caused the emergence of a significant market for various software products that provide endpoint data protection for these organizations. Our study will discuss some methods and technologies that deal with traditional, negative endpoint protection: Endpoint protection platform (EPP), and another new, positive endpoint protection: Endpoint detection and response (EDR). The comparison and evaluation between EPP and EDR in mechanism and effectiveness will also be shown. The study also aims to analyze the merits, faults, and key features that an excellent protection software should have. The objective of this paper is to assist small-scale and big-scale companies to improve their understanding of insider threats in such rapidly developing cyberspace, which is full of potential risks and attacks. This will also help the companies to have better control over their employee's endpoint to be able to avoid any future data leaks. It will also help negligent users to comprehend how serious is the problem that they are faced with, and how they should be careful in handling their privacy when they are surfing the Internet while being connected to the company's network. This paper aims to contribute to further research on endpoint detection and protection or some similar topics by trying to predict the future of protection products.
DOI10.1109/CyberC.2019.00023
Citation Keychandel_endpoint_2019