Endpoint security might not be the sexiest topic in the industry, but it’s rising ever higher on IT managers’ to-do list. For many organizations, a perfect storm of increasing cloud and BYOD adoption, combined with ineffective technology and stretched security teams, is exposing sensitive data to unnecessary risk. That’s why Trend Micro commissioned CIO.com (IDG Research Services) recently to explore current attitudes about endpoint security and what IT buyers are looking for in their providers.
It might surprise you to learn that endpoint security is rated a critical IT priority by over half of organizations, according to the study.
IT under fire
IT leaders are under siege. Never before have they had to cope with the sheer volume, complexity and variety of threats facing their organizations today. The bad guys are often well resourced, certainly determined and usually agile enough to escape capture. The truth is that many organizations had become at least capable of deflecting attacks using traditional methods and common malware families. But then came advanced targeted attacks and APTs.
Notoriously difficult for traditional security tools to spot, these attacks creep into and sit inside the network unnoticed, siphoning off sensitive customer data or IP for sale on the black market or for a nation state.
Added to this is that most organizations have a growing attack surface, thanks to the rise in popularity of BYOD devices, cloud apps and the shift towards data-centric business models. It’s perhaps not surprising in that context that so many IT leaders see endpoint security as a critical issue, yet our research also found dissatisfaction among many with their current tools.
Towards better practice
The survey found that IT leaders want a more effective, easier to use solution. So what’s the answer? Well, given the proliferation of endpoints in today’s organizations and the breadth of attack types used today, IT leaders need to find products that can consolidate a range of security capabilities into one easy-to-manage suite. And the survey results show that many IT professionals are starting to look to these multiple security layers:
- email security
- secure web gateway
- application whitelisting/control
- data loss prevention (DLP)
- advanced threat protection (for targeted attacks)
- virtual patching/host IPS
- mobile security
At Trend Micro, we take endpoint security extremely seriously. That’s why we offer customers Complete User Protection: a multi-layered approach to endpoint security incorporating tools that combine superior performance with low cost and centralized management. It’s all about delivering the best in threat protection across all endpoints, email and web and ensuring that customer data is safe whether it’s run in a physical, virtual or hybrid environment.
To find out more about the IDG research, Endpoint Security Must Get Better, click here.