Why DaaS Could Be Essential for Endpoint Security

Why More Devices Can Mean More Risk

There’s no stopping connected device deployments. Recent estimates suggest that by 2025, there will be more than 40 billion connected devices worldwide, generating almost 80 zettabytes (or 80 trillion gigabytes) of data annually.

More devices mean more risk. According to a survey from CyberArk, for example, 93 percent of parents working remotely said they reused passwords across apps and devices, 37 percent stored passwords in browsers and 29 percent allowed other members of their households to access corporate devices for personal use. This hasn’t gone unnoticed by attackers. Security firm Kaspersky detected more than 1.2 million malicious mobile installers in Q2 2020, up almost 100,000 from the previous quarter.

Combine that with many employees using personal devices to connect to corporate networks, and the issue gets even more complicated. IT teams already facing limited visibility at a distance are also kept at arm’s length by staff looking to protect personal data.

What Is Device as a Service?

DaaS offers an endpoint alternative. The idea is simple: Vendors preconfigure devices such as laptops, tablets or mobile devices with specific applications and security software, along with any value-added services that corporate clients request. Much like other “as a service” solutions, companies aren’t buying the devices themselves but instead are paying for access to the service of fully configured and secure devices. Pricing is generally assessed on a per-device basis, with companies able to customize deployments to suit unique use cases.

For end users, DaaS means no complicated setup or confusion about which apps to install or remove. Instead, they simply start up devices and get to work.

READ  4 Dividend-Paying Tech Stocks to Buy Before the New Year

MORE FROM BIZTECH: How highly mobile enterprises should use IAM tools.

Most DaaS vendors offer two- or three-year device contracts that include automatic updates and patching; when the term is up, companies can renew DaaS deployments or return their devices with no penalty. Worth noting: DaaS is sometimes confused with an identical acronym referring to Desktop as a Service. In the device case, vendors are supplying both physical hardware and necessary software, while in the desktop version, they’re offering virtual operating environments.

Getting the Right Security for DaaS

When it comes to endpoint security, DaaS delivers by providing a uniform environment for IT staff to monitor, manage and modify as needed. Instead of struggling to ensure that employees update personal devices or install specific security tools, DaaS puts everyone on the same protective page.

This unified approach also means that if specific endpoints are compromised, IT teams can find and deploy key fixes at scale rather than creating unique response frameworks for each personal device configuration.

While security teams may experience some pushback from staff who aren’t able to add or remove the applications of their choice, overall benefits typically outweigh these issues.

The DaaS market is rapidly expanding — as noted by Tech Republic, while there were no large-scale DaaS solutions just five years ago, 65 percent of major PC manufacturers offered this option to customers in 2019.

And while DaaS isn’t the end-all, be-all of endpoint defense, it’s a solid starting point for companies looking to streamline remote operations, reduce total complexity and improve security at scale.

READ  Security solution traps cyber criminals in a virtual network


Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.