In the parlance of network security, endpoint security is the process of giving protection to the company’s network by deploying in most cases but not exclusively software that is designed to protect the network from threats that may be borne by the multitude of devices that we are connecting to and using to access our networks, commonly devices such as PCs laptops, tablets or other wireless and mobile devices. Each device creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices. Most commonly endpoint security will be provided by deploying software that has the ability to be monitored and centrally managed by a server within the network. The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS). Endpoint security is a key IT security function and a genuine concern to businesses as more employees bring consumer mobile devices to work, a practice known as BYOD or Bring Your Own Device and companies increasingly need to manage the extent to which they allow their mobile workforce to use these devices on the company network.