Does Your Company Have EndPoint Security?
Like a twenty-first century digitized watchdog, properly implemented EndPoint security (EPS) is often the last line of defense between a cesspool squirming with destructive technological deviants and the safety and security of enterprise IT environments, says IDC.
According to a new IDC survey of 304 IT professionals and line-of-business managers, 64% of respondents stated they had EPS solutions, but the majority had trouble agreeing on what constitutes EndPoint security.
However, confusion surrounding EndPoint security - defined by IDC as centrally managed client security is leaving some organizations vulnerable to the malware, malicious code, and destructive spam that criminals are bent on pushing.
Exposed through increased numbers of uniquely different mobile devices and a widening variety of networking environments, IT organizations are prepared to embrace EPS solutions in what’s shaping up to be an epic battle between good and evil.
Among the other key findings, IDC says that the number of wireless e-mail devices and mobile phones accessing the enterprise network is growing at an astounding rate. The majority of both line-of-business and IT respondents want employees to have limited or absolutely no control over their local environments, observes the report.
Of the 64% of respondents claiming EPS solutions in place, 88% stated their solutions are somewhat or very effective.
“The complexity of the EPS problem has profound and far reaching effects throughout an organization,” said Allan Carey, manager of IDC’s Security and Business Continuity Services program.
“Enterprise senior management, as well as IT and business unit leaders, must see the big picture to address concerns about security, mobile device use and employee productivity, remote access, and centralized access control,” added Carey.
This IDC special study, Navigating the Client Security Fog: Helping the Enterprise Solve the EndPoint Security Crisis, provides a look into the EPS concerns of enterprise managers on the business and technical sides.
To gain this understanding, IDC used a structured interview tool to gather responses from 203 IT professionals and 101 line-of-business (LOB) managers at United States-based enterprises in various industries and of various sizes via a phone survey.
- Lack Of Trained Staff, Security Hinder FinTech Growth
- What’s Driving The Shift To Cryptocurrency Mining Malware?
- Why Enterprises Need To Automate Security Systems
- Ransomware Against IoT, Mobile On The Rise: SonicWall
- Employee Training: A Security Priority For Financial CISOs
- How To Become Cisco CCNA Security 210-260 Certified
- Women In Cybersecurity Face Harsh Reality: Study
- Decoding The Security Factor In IoT
- How Companies Can Disrupt Ransomware Attacks
- Weekly Rewind: Top 10 Stories On CXO Today (Oct 16-20)