Skip to main content

WHAT IS ENDPOINT SECURITY?

The primary concerns for endpoint security at Texas A&M include ensuring that all three primary computing environments—Windows, macOS, and Linux—are regularly updated and patched to protect against known vulnerabilities and misconfigurations. Servers must be secured to prevent data breaches, while mobile devices require strong authentication and encryption to safeguard sensitive information. Effective endpoint security means implementing comprehensive strategies such as antivirus protection, regular software updates, access controls, and user education to mitigate risks associated with these devices.

What is an Endpoint?

An endpoint at Texas A&M University refers to any device—such as Windows and macOS computers, Linux systems, servers, and mobile devices—that is used to access university resources or store university data. Endpoint security is critical because these devices are vulnerable to a variety of cyber threats, including malware, phishing, and unauthorized access, which can compromise sensitive research data, personal information, and administrative records.

NIST definition of “end user device”

End user devices are personal computers or consumer devices that can store information—such as a laptop or tablet, a smartphone or other consumer computing device, or even removable storage media like a USB drive. These devices are used daily to conduct most university business and provide a gateway to university data, research, and teaching platforms. Without adequate controls, the use of these devices can expose Texas A&M to costly risks, such as unauthorized access to data, loss of intellectual property, and non-compliance with state or federal laws.

Endpoint Security Team

The Endpoint Security Team is a dedicated, cross-functional group within the IT Security and Risk team in Technology Services tasked with ensuring robust protection across all endpoint devices. This team plays a critical role in distributing and managing security agents for Endpoint Detection and Response (EDR), Data Loss Prevention (DLP), and vulnerability scanning. By leveraging the expertise of representatives from various groups within IT Security and Risk, this team ensures comprehensive coverage and coordination in securing endpoints, preventing data breaches, and mitigating vulnerabilities across the University.

Security Agent Standardization Project

For information related to the Security Agent Standardization project, click here.

Contact Us

For help with any of the endpoint security tools or to request assistance from the Endpoint Security team, email endpoint-security@tamu.edu.