Does Your Company Have EndPoint Security?
Like a twenty-first century digitized watchdog, properly implemented EndPoint security (EPS) is often the last line of defense between a cesspool squirming with destructive technological deviants and the safety and security of enterprise IT environments, says IDC.
According to a new IDC survey of 304 IT professionals and line-of-business managers, 64% of respondents stated they had EPS solutions, but the majority had trouble agreeing on what constitutes EndPoint security.
However, confusion surrounding EndPoint security - defined by IDC as centrally managed client security is leaving some organizations vulnerable to the malware, malicious code, and destructive spam that criminals are bent on pushing.
Exposed through increased numbers of uniquely different mobile devices and a widening variety of networking environments, IT organizations are prepared to embrace EPS solutions in what’s shaping up to be an epic battle between good and evil.
Among the other key findings, IDC says that the number of wireless e-mail devices and mobile phones accessing the enterprise network is growing at an astounding rate. The majority of both line-of-business and IT respondents want employees to have limited or absolutely no control over their local environments, observes the report.
Of the 64% of respondents claiming EPS solutions in place, 88% stated their solutions are somewhat or very effective.
“The complexity of the EPS problem has profound and far reaching effects throughout an organization,” said Allan Carey, manager of IDC’s Security and Business Continuity Services program.
“Enterprise senior management, as well as IT and business unit leaders, must see the big picture to address concerns about security, mobile device use and employee productivity, remote access, and centralized access control,” added Carey.
This IDC special study, Navigating the Client Security Fog: Helping the Enterprise Solve the EndPoint Security Crisis, provides a look into the EPS concerns of enterprise managers on the business and technical sides.
To gain this understanding, IDC used a structured interview tool to gather responses from 203 IT professionals and 101 line-of-business (LOB) managers at United States-based enterprises in various industries and of various sizes via a phone survey.
- Password Protected Wi-Fi Is Also Prone To Hacks: Study
- The 10 Best Companies For Women In India
- Delving Into The ABC Of Cyber Security
- Large-Scale IoT Projects Doubled In Last One Year: Study
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 9-13)
- There's No Stopping The IoT Growth; Here's Why
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 2-6)
- Gartner: Top 10 Strategic Tech Trends For 2018
- Are You Choosing The Best Software For Your Business?
- Insider Threats and Its Impact On Data Security