The essence of my project was to draw attention to the danger of network attacks, which use vulnerabilities of the network endpoints’ operation systems and applications. My task also contained the investigation and presentation of the alternative security solutions, which helps to defend these kinds of assaults. Out of these opportunities I spent the largest part of my time with application whitelisting, but I also investigated update-management and rules of external device use. Furthermore, I briefly dealt with other widespread methods, as well.
In the prepared measurement environment I have made the efficiency test of the methods, with my own designed check tasks. I have managed the tasks with two different security-systems. My conclusion is that the product of Lumension Company is more useable for the three presented configuration-management techniques.
The hypothesis that the alternative security solutions are necessary has been confirmed during the research. With the use of the mentioned systems, the network endpoint’s security could be significantly increased.