What are the security risks associated with endpoint management?
Attackers place most of their efforts on exploiting endpoints, and new endpoint exploits are appearing at an ever-increasing rate. There are too many updates to the OS and applications are released too frequently to possibly keep all endpoints up to date on all security patches, compliance best practices, and security benchmarks.
Tags
Written by Deepak Kumar | Founder and Chief Technology Officer at Adaptiva

Dr. Deepak Kumar is the founder and chief technology officer at Adaptiva.
He is responsible for strategic product direction and leads the development organization. He was the lead program manager with Microsoft’s Systems Management Server 2003 team and program manager with the Windows NT Networking team.
Prior to Microsoft, he was a group manager for IP Telephony products at Nortel.
Dr. Kumar has received five patents related to his work on SMS 2003 at Microsoft and has written more than 50 publications, including a book on Windows programming.
While at Microsoft, Dr. Kumar also authored the Think Week paper for Bill Gates that became Project Greenwich, now known as Microsoft Office Communications Server/Lync.
Deepak is an avid outdoorsman and hiker. For more information, please visit www.adaptiva.com and follow the company on LinkedIn, Facebook, and Twitter.
More Q&As from our experts
- How can IT security be measured?
- How can security be both a project and process?
- What does 'layered security' really mean?
Related Terms
- Endpoint Device
- Endpoint Security
- Endpoint Security Management
- Exploit
- Patch
- Best Practice
- Grid Computing
- Pixel Pipelines
- Bypass Airflow
- Equipment Footprint
Related Articles

Making Networks More Secure in the Age of Cybersecurity

5 Things to Know About BYOD Security

Distributed Networks and the Challenge of Security

10 Steps to Strengthen Your IoT Security
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?
- Web Data Collection in 2022 - Everything you need to know
- How to Protect Microsoft 365 from NOBELIUM Hackers
- 5 Steps to Streamline Security for your Hybrid Network