Endpoint security solutions not meeting enterprise needs
Proliferation of devices, rise of BYOD, and targeted nature of malware threats are not being addressed by the majority of vendor solutions available today.
Enterprises do not have a clear and comparable choice of endpoint protection solutions that completely meet today’s mobile working security requirements, according to analyst firm Ovum.
“The proliferation of devices, the rise of bring-your-own-device (BYOD), and the targeted and persistent nature of malware threats are not being addressed by the majority of vendor solutions available today,” the analyst firm said in its report.
In Ovum’s latest Decision Matrix: Selecting an Endpoint Security Solution, the independent analyst firm reveals that endpoint protection has evolved far beyond the signature-based protection afforded by early-generation antivirus solutions.
“Today, businesses need vendors that can align services with the needs of each user and their devices, proportionate to the exposure to risk and role within the enterprise,” said Andrew Kellett, Senior Analyst at Ovum. “But for many organizations the first stumbling block will be trying to make direct comparisons between anti-malware vendors and their products.”
Ovum said that while all vendors claim to provide the best available protection when attacks take place, unfortunately the laboratory reports do not provide consistent or relevant answers. This is due to differing test environments, composition of test data sets, different risk-profile requirements, and ever-changing operational environments.
“Today’s endpoint security solutions must combine core on-device malware protection with intelligence-based support services that detect new threats before a traditional signature is available. These support services are now more likely to be cloud-based so the speed of service delivery and security updates can be maintained at a high level,” said Kellett.
Ovum said that it has addressed this issue with its Decision Matrix (ODM), which provides direct assessments of the eight top players in the endpoint security market and categorizes them into Leaders, Challengers and Followers. The ODM focuses on each vendor’s functionality for detecting malware, taking feedback from organizations that have used or continue to use each solution, and reporting on their stated levels of satisfaction
- Using New Techniques To Combat Cyber Threats
- What’s Driving The Shift To Cryptocurrency Mining Malware?
- Four Reasons For Indian Enterprises To Move To SIP
- How Machine Learning Is Changing CIO's Role
- Ransomware Against IoT, Mobile On The Rise: SonicWall
- India's Enterprise Software Spending To Outgrow China: Gartner
- Blockchain Can Radically Transform Digital Marketing
- Employee Training: A Security Priority For Financial CISOs
- Woman Empowerment Through Edtech
- Decoding The Security Factor In IoT