Does Your Company Have EndPoint Security?
Like a twenty-first century digitized watchdog, properly implemented EndPoint security (EPS) is often the last line of defense between a cesspool squirming with destructive technological deviants and the safety and security of enterprise IT environments, says IDC.
According to a new IDC survey of 304 IT professionals and line-of-business managers, 64% of respondents stated they had EPS solutions, but the majority had trouble agreeing on what constitutes EndPoint security.
However, confusion surrounding EndPoint security - defined by IDC as centrally managed client security is leaving some organizations vulnerable to the malware, malicious code, and destructive spam that criminals are bent on pushing.
Exposed through increased numbers of uniquely different mobile devices and a widening variety of networking environments, IT organizations are prepared to embrace EPS solutions in what’s shaping up to be an epic battle between good and evil.
Among the other key findings, IDC says that the number of wireless e-mail devices and mobile phones accessing the enterprise network is growing at an astounding rate. The majority of both line-of-business and IT respondents want employees to have limited or absolutely no control over their local environments, observes the report.
Of the 64% of respondents claiming EPS solutions in place, 88% stated their solutions are somewhat or very effective.
“The complexity of the EPS problem has profound and far reaching effects throughout an organization,” said Allan Carey, manager of IDC’s Security and Business Continuity Services program.
“Enterprise senior management, as well as IT and business unit leaders, must see the big picture to address concerns about security, mobile device use and employee productivity, remote access, and centralized access control,” added Carey.
This IDC special study, Navigating the Client Security Fog: Helping the Enterprise Solve the EndPoint Security Crisis, provides a look into the EPS concerns of enterprise managers on the business and technical sides.
To gain this understanding, IDC used a structured interview tool to gather responses from 203 IT professionals and 101 line-of-business (LOB) managers at United States-based enterprises in various industries and of various sizes via a phone survey.
- Skybox Finds Cryptomining Malware Now Dominates Threat landscape
- Know Before Getting Your Cloud Architecture In Shape
- CISOs Should Help In Building Digital Trust With Consumers, Says Study
- Battling Cyber Risks With Intelligent Automation
- Ensuring A Secured Blockchain Ecosystem
- Cyber GCCs In India At The Cusp Of Transformation
- Have We Learnt A Lesson From Facebook-Cambridge Analytica Crisis?
- Firms Unable To Cope With Security Skill Gap, Vendor Sprawl: Study
- Why VPN Services Are Getting More And More Popular
- 5 Ways To Create A CX-First Culture For Executives