ANZ users frustrated with endpoint security

ANZ users frustrated with endpoint security

There's a groundswell of frustration about today's endpoint security, as well as worries about how newer technologies such as virtualisation or cloud computing will impact it, according to a new study.

The Ponemon survey of 1,427 professionals in IT security and 1,582 in IT operations, working in business or government who live in the United States, the United Kingdom, Australia, New Zealand or Germany, were asked how they managed endpoint security, how things were going with the budget and security policies, and even whether the IT security and operations divisions worked well together.

The result of the Ponemon survey, titled "State of the Endpoint," paints a picture of discontent — though respondents in Germany were the most upbeat, expressing views that they were executing well on policies and their IT security budgets were holding up.

"The Germans are much more structured in their thinking about these issues, such as collaboration and policy," says Dr Larry Ponemon, chairman of Ponemon Institute, which conducted the study with sponsorship from Lumension. "They have the highest regard for policies.”

Seventy-seven percent of the respondents in Germany said they thought their network was more secure than a year ago, while only 44 percent in the United States, 42 percent in Australia and New Zealand, and 57 percent in the United Kingdom felt that way. When asked if the organisation's IT security budget supported business objectives, 51 percent in Germany said it did, but only 43 percent in Australia and New Zealand, 31 percent in the United Kingdom and a mere 27 percent in the United States answered yes.

Overall, 49 percent said "data security is not a strategic initiative" for their companies, and 56 percent believe "mobile devices are not secure." Forty-four percent said their organisations subsidise or plan to subsidise employees' mobile devices, 40 percent say employees can connect their devices to the company network and 26 percent have policies permitting employees to connect their own devices to the company network.

There was a widely noted disconnect between how well the IT security and operations people work together on security-related projects, plus frustration about the level of involvement of the CIO. Seventeen percent of all respondents described the collaboration between the IT and security operations as "excellent," 52 percent said it "could be improved" and 31 percent said it was "poor."

Ponemon said IT operations people tend to have a "git 'er done" attitude while security people more often will want to hold back as they contemplate the impact of new IT undertakings on risk.

He also noted that US respondents view technology as "the main driver for confidence in the security infrastructure" and are eager buyers. However, he added that putting several different point solutions in place can make the IT operations people "upset."

The five most important features for managing endpoint security identified in the survey were: antivirus and antimalware; whole disk encryption; application control; patch and remediation management; and IT asset management.

In terms of what the survey's respondents said about technology use today, they reported an average of 3.7 software agents installed on each endpoint for purposes of managing security, and 3.9 software management consoles to deal with. Some 83 percent of the survey's respondents said that within the next 12 to 24 months they intend to have an "integrated endpoint security suite"that would include functions such as vulnerability assessment, data-loss prevention, antivirus/antimalware and other capabilities.

The things that the IT security and operations people are worrying about appear to include increasing use of technologies that involve open source, Web 2.0 applications, cloud computing and virtualisation, plus mobile computing.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags endpoint security

Brand Post

How to become the best IT MSP

This article provides guidance for managed service providers (MSPs) that want to grow their business. It is also useful for any IT service provider looking to move from the break-fix model to managed IT services.



Reseller News Innovation Awards 2019: meet the winners

Reseller News Innovation Awards 2019: meet the winners

Reseller News honoured the standout players of the New Zealand channel in front of more than 480 technology leaders in Auckland on 23 October, recognising the achievements of top partners, emerging entrants and innovative start-ups.

Reseller News Innovation Awards 2019: meet the winners
Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
Show Comments