- info@borderlesscs.com.fj
- Opposite Westfield Central, Office Number 9, Lot 13, Legalega Ln, Nadi
Call 9AM - 5PM
+679 999 1410
Call 9AM - 5PM
+679 999 1410
Endpoint protection is a crucial aspect of cybersecurity, focusing on securing individual devices (endpoints) within a network against various threats, such as malware, ransomware, phishing, and other cyber-attacks.
Borderless CS endpoint protection strategy ensures the organization's devices are shielded from potential threats, safeguarding sensitive data and maintaining operational integrity.
| Recovery Time Objective (RTO) | Time | Comments |
|---|---|---|
| Primary Environment (Production) | 60 min | In the event of a failure, the primary Endpoint Protection environment will be restored within 60 minutes, ensuring minimal data loss and uninterrupted operations. |
| Secondary Environment (Disaster Recovery) | 180 min | In the event of a disaster, the secondary Endpoint Protection environment will be restored within 3 hours. Data recovery will be up to 24 hours prior to the incident. |
| Antivirus Engine and Definitions | 90 sec | Quick recovery of antivirus engine and updated definitions within 1.5 minutes ensures that devices are protected against the latest threats upon restoration. |
| Policy Configuration and Enforcement | 120 sec | Restoring policy configurations and ensuring their enforcement within 2 minutes is essential for maintaining consistent security protocols across all endpoints. |
| Centralized Management Console | 60 sec | Swift recovery of the management console within a minute is necessary for centralized monitoring, reporting, and management of endpoint security measures. |
| Testing and Maintenance | Quarterly | Regular DR drills and simulations will be conducted quarterly to validate the effectiveness of the DR plan. Any changes in the endpoint protection configuration will prompt immediate DR plan updates and subsequent testing. |