Originally posted February, 2015, updated February 2019
Jargon abounds in the technical world of IT, with obscure-but-precise language sometimes getting in the way of conceptual understanding. The term endpoint fits the bill. While it may make sense to a seasoned IT professional, the rest of us may need a little help. What exactly is an endpoint? Why does it matter?
Download Executive Brief: 3 Steps To Comprehensive Data Governance For End User Data
According to Wikipedia, “endpoint” is a hardcore punk band from Louisville, Kentucky. A more common definition for endpoint in computer networking, architecture, and operations, however, is a mobile device such as a laptop, phone, or tablet.
The term has its origin in reference to computer networks. The endpoint is a device or node that is connected to the LAN or WAN and accepts communications back and forth across the network. In a traditional sense, an endpoint can be a modem, hub, bridge, or switch. It also could be data terminal equipment (such as a digital telephone handset, router, or printer) or a host computer (such as a workstation or a server).
Yet today endpoint is used most commonly in network security and end user mobility circles to mean any device outside the corporate firewall. That could be a laptop, tablet, or mobile phone on the “edge” (or periphery) of the network and that individuals connect to the central network.
Endpoint use is increasing in the business world due to workforce mobility, the term for the rarity that you’re ever in your office, much less tethered to a desk. Traditional network-focused protocols are designed for the PC-era and the desktop. But with, over 30percent of data outside the firewall on endpoint devices, IT needs to deal with security and communications in real time, across varying locations and bandwidths, with possibly insecure apps loaded on an ever-increasing number of devices, with consistent exposure to malware across Internet protocols.
IT teams solve for the challenges of endpoints using a variety of technologies (such as virtual private networks, VPNs) that enable safe connection to the main, managed network. Cloud endpoint data protection technologies (like Druva!) also enable real-time backup of the data on endpoints, minimizing the risk of data loss. They also give IT tools to manage corporate data on endpoints, such as the ability to remote wipe and create a trusted data store in the cloud. They can even be used to automatically detect a malware or ransomware attack, allowing an IT admin to address it immediately – before it causes further damage.
Endpoints are fast becoming a more common way to compute and communicate than the local, fixed machines from which they were derived. The notion of a safe and secure network and insecure endpoints is fast giving way to a more modern concept: that of computing across any device or network, with always-on security protecting companies and users across local and cloud-enabled storage.