25.4 C
New York

Nearly half of enterprise endpoint devices present significant security risks

Published:


Organizations are struggling to handle devices and keep forward of vulnerabilities, patches and assaults, in line with a brand new report from Adaptiva and the Ponemon Institute.

hacker attack, cyber crime concept
Image: Song_about_summer/Adobe Stock

Device sprawl is turning into a expensive security headache with the common enterprise now managing roughly 135,000 endpoint devices, a brand new report finds. Despite $4,252,500 of annual finances spent on endpoint safety, a mean of 48% of devices — or 64,800 per enterprise — are in danger as a result of they’re not detected by a corporation’s IT division or the endpoints’ working techniques have grow to be outdated, in line with the inaugural report, Managing Risks and Costs at the Edge, from Adaptiva and the Ponemon Institute.

Additionally, 63% of respondents reported that the dearth of visibility into their endpoints is probably the most significant barrier to attaining a powerful security posture.

Additional findings from the report

Sprawling centralized infrastructure

IT organizations are going through unprecedented charges of distribution level sprawl, which has grown quickly for the reason that onset of the COVID-19 pandemic. Sixty-one p.c of respondents mentioned distribution factors have elevated within the final two years, and the common endpoint has as many as seven brokers put in for distant administration, additional including to administration complexity.

SEE: Password breach: Why pop culture and passwords don’t mix (free PDF) (TechRepublic)

Updates are hardest to take care of

62% of respondents mentioned new OS and utility variations are probably the most tough to take care of throughout all endpoints, adopted by patches and security updates at 59%, and community settings and connectivity points at 50%.

Lacking assets

66% of respondents mentioned that their organizations don’t have ample assets to reduce endpoint threat. Consequently, respondents point out they might solely cease 52% of assaults with their present applied sciences and experience.

Endpoint instruments for a distributed, decentralized, digital-first world

Although the world has considerably modified within the final two years, there haven’t been any significant improvements within the endpoint administration house for over a decade, for the reason that creation of cloud computing, mentioned Deepak Kumar, founder and CEO of Adaptiva.

“Unfortunately, most organizations are running uphill with endpoint management tools that weren’t designed for today’s distributed, decentralized and digital-first world,” Kumar mentioned.

Contrary to common opinion, investing extra in centralized distribution infrastructures or shifting to the cloud gained’t remedy the issue, in line with Kumar.

“The plan to invest money in endpoint security content distribution is promising, but it’s only one part of the solution,” Kumar mentioned. “Throwing more money at more distribution servers will just increase the investment without solving the underlying problem. It will increase management costs without improving device visibility.”

Additionally, using extra folks to search out and repair techniques gained’t work both, as a result of they’ll’t repair what they’ll’t see — and what they’ll’t see is on the core of the issue.

“Every new security solution that bolts onto your existing stack will just make it more complex and less agile,” Kumar mentioned. “IT needs tools that provide organizations with total and complete visibility over their endpoints, with real-time and continuous delivery of content to keep them healthy, patched and secure. This won’t be achieved by the dominant endpoint management solutions in the market today, which still rely on bloated centralized infrastructure, in the cloud and on-prem.”

Utilize the sting because the infrastructure

As cyberattacks improve in frequency and magnitude, organizations are below growing strain to implement efficient endpoint administration techniques. Fifty-four p.c of respondents had a mean of 5 assaults on their organizations within the final yr, at a mean annual value of $1.8 million, in line with the report. The cascading results of system downtime and disruptions to worker productiveness have left organizations scrambling to maintain up.

“Rather than relying on tools that run on centralized infrastructure to monitor and maintain widely distributed endpoint devices, consider utilizing your edge as the infrastructure instead,’’ Kumar said. “Shifting from centralized infrastructure, whether on-prem or in the cloud, to one powered by your edge will help keep endpoints visible, allowing them to remain up to date to protect them against threats.”

This offers full visibility from IT’s place of central management, and practitioners are capable of see with extra readability how the group’s endpoint devices are behaving whereas containing prices.

“This will allow you to eliminate distribution points from your architecture, as the apps that monitor and maintain your endpoints will reside and execute on your edge rather than on unscalable centralized servers,’’ Kumar said. “This will create a self-sustaining, fault-tolerant, and adaptive network of peer-to-peer endpoints that heighten performance, security and resilience.”

Adaptiva and Ponemon Institute mentioned 629 IT and IT security practitioners within the United States had been surveyed, representing a mean organizational headcount of 13,213 and IT finances of $184,366,500. Respondents indicated that the majority enterprises wrestle to take care of visibility and management of their endpoint devices, resulting in elevated security breaches and impaired means to thrust back outdoors assaults.


“If you will have any Query Related This Post then right here is the Source Link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related articles

Recent articles