Does Your Company Have EndPoint Security?
Like a twenty-first century digitized watchdog, properly implemented EndPoint security (EPS) is often the last line of defense between a cesspool squirming with destructive technological deviants and the safety and security of enterprise IT environments, says IDC.
According to a new IDC survey of 304 IT professionals and line-of-business managers, 64% of respondents stated they had EPS solutions, but the majority had trouble agreeing on what constitutes EndPoint security.
However, confusion surrounding EndPoint security - defined by IDC as centrally managed client security is leaving some organizations vulnerable to the malware, malicious code, and destructive spam that criminals are bent on pushing.
Exposed through increased numbers of uniquely different mobile devices and a widening variety of networking environments, IT organizations are prepared to embrace EPS solutions in what’s shaping up to be an epic battle between good and evil.
Among the other key findings, IDC says that the number of wireless e-mail devices and mobile phones accessing the enterprise network is growing at an astounding rate. The majority of both line-of-business and IT respondents want employees to have limited or absolutely no control over their local environments, observes the report.
Of the 64% of respondents claiming EPS solutions in place, 88% stated their solutions are somewhat or very effective.
“The complexity of the EPS problem has profound and far reaching effects throughout an organization,” said Allan Carey, manager of IDC’s Security and Business Continuity Services program.
“Enterprise senior management, as well as IT and business unit leaders, must see the big picture to address concerns about security, mobile device use and employee productivity, remote access, and centralized access control,” added Carey.
This IDC special study, Navigating the Client Security Fog: Helping the Enterprise Solve the EndPoint Security Crisis, provides a look into the EPS concerns of enterprise managers on the business and technical sides.
To gain this understanding, IDC used a structured interview tool to gather responses from 203 IT professionals and 101 line-of-business (LOB) managers at United States-based enterprises in various industries and of various sizes via a phone survey.
- How Banks Can Collectively Combat Security Threats
- Mobile Operators To Cope With HD, Encryption Issues: Study
- 70% Indian Firms To Deploy AI By 2020: Intel
- Why Cloud Adopters Need Visibility Into Their Network
- Cyber Security Jobs At Premium As India Goes Digital
- Trends In Information Management: An India Perspective
- Cyber Security Predictions For 2018
- SpiderOak CEO Warns Of 10 Cybersecurity Threats For 2018
- Uber Data Breach: Accountability, Corporate Ethics In Question
- Customer-Facing Web, Mobile Apps Pose Highest Security Risk: Study