Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks.
Over the past few years things have been changing. Endpoints now, are likely to be mobile devices using various operating systems, to reside on a server in the cloud by way of desktop virtualization, or to be a non-Windows machine running Apple or Linux.
To address this new environment, organizations need to look for specific capabilities when selecting their endpoint security solution. These include:
• The ability to have one product that can be used to protect a wide range of devices (Windows, MAC, Linux), work in virtualized environments, and deal with removable media
• Centralized management with remote administration that verifies protection, is used for compliance reporting, and saves IT resources.
• High level of performance. This includes a small footprint and fast scanning so as to not negatively impact on machine performance, while at the same time maintaining a high level of protection.