Endpoint security solutions not meeting enterprise needs
Proliferation of devices, rise of BYOD, and targeted nature of malware threats are not being addressed by the majority of vendor solutions available today.
Enterprises do not have a clear and comparable choice of endpoint protection solutions that completely meet today’s mobile working security requirements, according to analyst firm Ovum.
“The proliferation of devices, the rise of bring-your-own-device (BYOD), and the targeted and persistent nature of malware threats are not being addressed by the majority of vendor solutions available today,” the analyst firm said in its report.
In Ovum’s latest Decision Matrix: Selecting an Endpoint Security Solution, the independent analyst firm reveals that endpoint protection has evolved far beyond the signature-based protection afforded by early-generation antivirus solutions.
“Today, businesses need vendors that can align services with the needs of each user and their devices, proportionate to the exposure to risk and role within the enterprise,” said Andrew Kellett, Senior Analyst at Ovum. “But for many organizations the first stumbling block will be trying to make direct comparisons between anti-malware vendors and their products.”
Ovum said that while all vendors claim to provide the best available protection when attacks take place, unfortunately the laboratory reports do not provide consistent or relevant answers. This is due to differing test environments, composition of test data sets, different risk-profile requirements, and ever-changing operational environments.
“Today’s endpoint security solutions must combine core on-device malware protection with intelligence-based support services that detect new threats before a traditional signature is available. These support services are now more likely to be cloud-based so the speed of service delivery and security updates can be maintained at a high level,” said Kellett.
Ovum said that it has addressed this issue with its Decision Matrix (ODM), which provides direct assessments of the eight top players in the endpoint security market and categorizes them into Leaders, Challengers and Followers. The ODM focuses on each vendor’s functionality for detecting malware, taking feedback from organizations that have used or continue to use each solution, and reporting on their stated levels of satisfaction
- Ten Trends Redefining Enterprise IT In 2018
- 70% Indian Firms To Deploy AI By 2020: Intel
- Enterprise Networks: Things To Focus On In 2018
- Trends In Information Management: An India Perspective
- WB To Announce New IT Policy To Woo Investors: CM
- SpiderOak CEO Warns Of 10 Cybersecurity Threats For 2018
- GES '17: Ivanka Trump’s Focus On Tech Is Not Misplaced
- 70% Consumers Stop Following A Business After Data Breach: Study
- CISOs, Beware Of Crime-as-a-Service, IoT Threats In 2018
- AI To Bring More Jobs, Revenues To Businesses