Endpoint Security Complexity Supports Need for Data-Aware Ecosystem

Be honest. Up until a few years ago, you may have associated “endpoint security” with those routine virus scans that pop up on your desktop from time to time.

If this is true, you’re in good company – in fact, the vast majority of the IT industry is right there with you. The first commercial endpoint security products became available in the late 1980s and although it was nearly synonymous with antivirus software for a long time, endpoint security was a cornerstone of the wider information security industry. However, now that attackers are learning to circumvent security measures and exploit internal weaknesses, breaches are on the rise and the security conversation has expanded to include all areas of a business.

In a recent report, ESG analysts Jon Oltsik, Bill Lundell, Jennifer Gahm and Kyle Prigmore set out to assess the state of endpoint security by surveying 340 IT and information security professionals representing large midmarket and enterprise-class organizations in North America. Their goal was to find out how these IT pros are pivoting security strategies in response to new threats and attacks on the horizon.

Endpoint security requirements are changing

The legacy skills and technologies that once addressed corporate security are no longer sufficient to cover the full range of the security ecosystem. This is clear in a few takeaways from the report:

  • Eighty percent of security professionals surveyed agree managing endpoint security processes and technologies has become more difficult over the last two years, due in large part to the rise of targeted attacks and an increasingly dangerous threat landscape.
  • Nearly 40 percent of security professionals said their security teams “spend a lot of time “firefighting” and little time with process improvement or endpoint security strategy.”
  • Almost 30 percent polled complained endpoint security is based on too many onerous manual processes.
  • More than one third of organizations view endpoint security as a compliance checkbox task, while 23 percent view endpoint security as a basic requirement, neglecting both the time and effort necessary to develop endpoint security best practices.

Taken together, these insights make it clear that simplified compliance, advanced automation and accelerated responsiveness are critical for companies to address issues in their data and solve problems before they expose vulnerabilities and cause data breaches. One of the most common use cases for data-aware storage is the need to find and manage confidential and sensitive data within files to ensure sensitive information isn’t leaking into the wrong hands. Most companies don’t know what’s in their data, and as ESG findings demonstrate, you’ll have a hard time protecting your data if you’re spending time fighting fires and checking off your compliance to-do list.

Balance your endpoint security strategies and protect your data at its core with tips from DataGravity on managing sensitive information.


1 Like
Jeff Boehm

Jeff Boehm

Jeff Boehm was the vice president of marketing at DataGravity for 2 years. Jeff brought more than 20 years of experience with a rare combination of marketing skills, organizational leadership and technical background to DataGravity, having shaped the BI and search markets working for industry pioneers and disrupters.