Endpoint security solutions not meeting enterprise needs
Proliferation of devices, rise of BYOD, and targeted nature of malware threats are not being addressed by the majority of vendor solutions available today.
Enterprises do not have a clear and comparable choice of endpoint protection solutions that completely meet today’s mobile working security requirements, according to analyst firm Ovum.
“The proliferation of devices, the rise of bring-your-own-device (BYOD), and the targeted and persistent nature of malware threats are not being addressed by the majority of vendor solutions available today,” the analyst firm said in its report.
In Ovum’s latest Decision Matrix: Selecting an Endpoint Security Solution, the independent analyst firm reveals that endpoint protection has evolved far beyond the signature-based protection afforded by early-generation antivirus solutions.
“Today, businesses need vendors that can align services with the needs of each user and their devices, proportionate to the exposure to risk and role within the enterprise,” said Andrew Kellett, Senior Analyst at Ovum. “But for many organizations the first stumbling block will be trying to make direct comparisons between anti-malware vendors and their products.”
Ovum said that while all vendors claim to provide the best available protection when attacks take place, unfortunately the laboratory reports do not provide consistent or relevant answers. This is due to differing test environments, composition of test data sets, different risk-profile requirements, and ever-changing operational environments.
“Today’s endpoint security solutions must combine core on-device malware protection with intelligence-based support services that detect new threats before a traditional signature is available. These support services are now more likely to be cloud-based so the speed of service delivery and security updates can be maintained at a high level,” said Kellett.
Ovum said that it has addressed this issue with its Decision Matrix (ODM), which provides direct assessments of the eight top players in the endpoint security market and categorizes them into Leaders, Challengers and Followers. The ODM focuses on each vendor’s functionality for detecting malware, taking feedback from organizations that have used or continue to use each solution, and reporting on their stated levels of satisfaction
- Even Minor Glitches And Breaches Can Kill Brands
- Third Party Digital Cos Will Generate Over $31 Bn This Year
- Paying Ransom Makes One More Susceptible To Attack: Report
- Keysight Gears Up For 5G, High-Speed Datacenters In India
- Insider Threats and Its Impact On Data Security
- 6 Jobs Artificial Intelligence Is Replacing Soon
- Oracle's Thomas Kurian Outlines Future Of Enterprise Cloud
- Enterprises See Gap In IoT-ERP Integration: Study
- Oracle Announces New Cloud Programs For The Enterprise
- Negligent Staff, Poor Passwords Trigger Cyber Threats: Study