openPR Logo
Press release

CISO MAG study: 1 in 3 CISOs feel the biggest challenge of endpoint solution is its complexity

11-26-2019 09:53 AM CET | IT, New Media & Software

Press release from: EC-Counci

CISO MAG

CISO MAG

Today, the typical organization has hundreds if not thousands of endpoints: desktops, workstations, laptops, mobile phones, tablets, access points, printers, IP-cams, USB devices, credit card readers, POS devices, servers, cloud VMs, and virtual desktops. The addition of IoT devices will increase the number of endpoints even more. Traditional anti-malware, signature-based, and file-scanning solutions will not be able to keep up and manage all those endpoints. This raised concerns with organizations delving into endpoint security.

CISO MAG, an information security news website, and publication from EC-Council conducted a multiple-choice survey, in the month of October 2019 to present new research on the usage of endpoint security solutions.

3 Key takeaways

The three prominent findings that stand out in the survey are:

The best of both: Half of all companies (53.19%) that participated in this survey are using both EPP and EDR solutions.
Endpoint visibility: Almost half of the respondents (46.38%) want real-time endpoint and application visibility.
Managed services: Two-thirds (62.55%) said their endpoint solution included managed endpoint detection services.

Some vendors are sweetening their offerings by bundling endpoint monitoring and management services. These services offer in-depth or advanced threat hunting, forensics, and remediation services.

Another key trend is that endpoint protection is now moving to the cloud, with SaaS-based services for monitoring endpoints. The demand for endpoint security services has increased as cloud security has improved. Traditionally, endpoints were centrally managed from an on-premise server communicating with agents on the endpoints. This shifts the responsibility of managing endpoints out of the enterprise and into the hands of managed security services providers (MSSPs).

Here are some key findings of the survey, indicating that many organizations still need to complete their endpoint security deployments.

Key Findings

More than half the respondents (62.98%) have been using an endpoint security solution for some time.
It is surprising to note that 14.89% are not using any endpoint security solution.
The rest of the respondents (22.13%) are either in the process of evaluating a solution, implementing a solution, or conducting pilot trials.
Almost half the respondents (46.38%) agree that an endpoint security solution offers better or real-time endpoint and application visibility.
A quarter of the respondents (25.11%) said there was increased usage of mobile devices and endpoints in their organizations.
A fifth (20.85%) agreed there was increased volume and complexity of breaches.
More than half (53.19%) are using a combination of EPP and EDR solutions while the rest are using one or the other.
Two-thirds (62.55%) said their endpoint solution included managed endpoint detection services, while a little over one-third (37.45%) said they were not using such services.
More than half the respondents (52.34%) said the main factor in deciding the type of endpoint solution they want is the technical capability of the solution.
A third of the respondents (32.77%) said the biggest challenge is the complexity of deploying, managing, and using endpoint solution.

Methodology

The online survey was conducted by CISO MAG readers from EC-Council’s database. The respondents represent a cross-section of organizations from over 42 countries. Responses were received from those living in the U.S., U.K., UAE, Singapore, Egypt, and The Netherlands. Entries were also received from islands in the Caribbean Sea, such as St. Vincent & The Grenadines, and Trinidad & Tobago.

The survey was prepared in consultation with security experts and industry analysts.

Survey Respondent Profile

IT Manager/ICT Manager
Head of IT/VP IT
MIS Manager
IT Security Manager
Information Security Manager
Manager/Head of Network Security
Director of Information Security
ISO/Information Security Officer
Security Operations Officer/Operation Security Manager
VP/CISO
CIO
Security Consultant
Cybersecurity/Security Analyst
Cybersecurity Architect
Cybersecurity Engineer
Head of IS and SOC
ICT Security, Risk & Compliance Coordinator
Head IT, Risk & Security

Read the full survey report and the latest issue of CISO MAG here.

About CISO MAG

CISO MAG is a publication from EC-Council, which provides unbiased and useful information to the professionals working to secure critical sectors. The information security magazine includes news, comprehensive analysis, cutting-edge features, and contributions from thought leaders that are nothing like the ordinary. Within the first year of launch, the magazine reached a global readership of over 50,000 readers. The magazine also has an Editorial Advisory Board that comprises some of the foremost innovators and thought leaders in the cybersecurity space. Apart from this, CISO MAG also presents a platform that reaches out to cybersecurity professionals across the globe through its Summits and Awards and Power List surveys.

EC-Council
101C Sun Ave NE
Albuquerque, NM 87109

About EC-Council

EC-Council has been the world’s leading information security certification body since the launch of their flagship program, Certified Ethical Hacker (CEH), which created the ethical hacking industry in 2002. Since the launch of CEH, EC-Council has added industry-leading programs to their portfolio to cover all aspects of information security including EC-Council Certified Security Analyst (ECSA), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (CCISO), among others. EC-Council also hosts conferences across the US and around the world, including Hacker Halted, Global CISO Forum, and CISO Summit. For more information about EC-Council, please see http://www.eccouncil.org.

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release CISO MAG study: 1 in 3 CISOs feel the biggest challenge of endpoint solution is its complexity here

News-ID: 1872255 • Views:

More Releases for CISO

Digital Identity Management for the CMO, CISO, and CIO by LoginRadius
Leading CIAM platform supports the Digital Identity Management for the CMO, CIO, and CISO. LoginRadius, a global leader in consumer identity and access management (CIAM), today announces the details of its latest launch, Digital Identity Management for the CMO, CISO, and CIO. Solutions for Customer Identity and Access Management (CIAM) have increased in significance in recent years. It has become the cornerstone for companies that aspire to provide excellent service while retaining
Pivot Point Security Kicks Off "The Virtual CISO" Podcast With Katie Arrington, …
Hamilton, NJ Release: February 25th, 2020 For Immediate Release Pivot Point Security launches its new podcast series, "The Virtual CISO Podcast", with a frank discussion about the new CMMC audit program for defense contractors featuring Katie Arrington, the DoD's program lead, and Pivot Point Security's CISO & Managing Partner, John Verry. With over $600 billion in data assets lost yearly to data exfiltration and cyber espionage, the urgent need for stronger
EC-Council conducts a sold-out CISO Wargames simulation with Top Cybersecurity E …
Summary: EC-Council, leading global information security certification body, conducted a head-to-head simulated cyber wargame among top cybersecurity executives in Tampa, Florida. Tampa, Florida, February 6, 2020 - The sold-out session, "CISO wargame," had 27 senior executives from the largest managed IT service providers in the United States. They collaborated for a simulated incident where an organization is hit by a ransomware attack. Role-playing as c-suite executives, participants had to endure a
Programmable Logic ICS Market 2019: Size, Share, Growth, Key Drivers, Applicatio …
Programmable Logic ICS Market Research Report 2019 provides information for evaluating the market, highlighting opportunities, supporting strategic and tactical decision–making. The report studies the Programmable Logic ICS Market worldwide with market size, growth, revenue, consumption, trends, import and export in these regions. Get Sample Copy at https://www.orianresearch.com/request-sample/742648 The report highlights information that is required to understand the innovation and development in the Programmable Logic ICS market, and the growing nature
Public Safety Analytics Market Is Booming Worldwide | Ciso, Esri, Hexagon, Hitac …
HTF Market Intelligence released a new research report of 162 pages on title 'Global Public Safety Analytics Market (By Service Type- Consulting Service, Support & Maintenance, Managed Services, and Others. By Analytics Type- Identify Analytics, Descriptive Analytics, Video Analytics, Predictive Aanalytics, Prescriptive Analytics and Others. By Application- Survelliance, pattern Recognition, Incident Detection, and Others. By End- User - Public Transportation, Law Enforcement & Intelligence Agencies, Critical Infrastructure Security, and Others
Programmable Logic ICS 2018 Global Industry Key Players - Ciso , Fortinet , Ka …
Global Programmable Logic ICS Market In this report, the global Programmable Logic ICS market is valued at USD XX million in 2017 and is expected to reach USD XX million by the end of 2025, growing at a CAGR of XX% between 2017 and 2025. Global Programmable Logic ICS market competition by top manufacturers, with production, price, revenue (value) and market share for each manufacturer; the top players including  Ciso  Fortinet  Kaspersky  Symantec  ABB  Emerson Electric  Honeywell International  Siemens  Yokogawa Electric  General