How to Answer: Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?
Advice and answer examples written specifically for a Tanium job interview.
20. Our clients know a great deal about cloud and network security, but they generally aren't familiar with Endpoint security and their vulnerabilities in this area. How would you describe Endpoint security to a customer so they understand the threat?
How to Answer
The interviewer is seeking to determine your knowledge of Endpoint security relative to IT security in general. They also are looking for a demonstration of your presentation skills and how you can position products and services in relation to client needs.
1st Answer Example
"The most vulnerable part of your IT infrastructure is the end devices. These are the systems, laptops and mobile devices people use to access the network, their applications, and data. Securing these are a challenge to organizations due to the high number of devices, their locations and the activities users engage in. The best way to secure these devices is to use a software approach which identifies and manages the user devices across the network. Components of the software approach are virtual private networks (VPNs,) antivirus software and secure operating systems. Endpoint devices are then provisioned with the correct access to corporate assets in accordance with the user's needs and company policies."
2nd Answer Example
"Endpoint security involves securing the most vulnerable part of the network, the end user devices. These include desktop systems, laptops, and mobile devices. The challenge of securing these devices stems from their high number, the fact that they are widely dispersed and mobile, and that end users behave badly and unintentionally create security vulnerabilities. The endpoint devices can be secured if a comprehensive software-based management system is developed and deployed. The components of an effective software management system are secure operating systems, antivirus software applications, and virtual private networks (VPNs.) I believe Tanium offers an integrated solution to endpoint security which employs each of these solutions."
Anonymous Interview Answers with Professional Feedback
Anonymous Answer
Rachelle's Feedback