Endpoint Security Overload

  /     /     /  
Publicated : 22/11/2024   Category : security


Endpoint Security Overload


CISOs and their teams are over-investing in endpoint security tools, driving inefficiency and a need to consolidate data.



An excess of endpoint security tools in organizations is driving information security debt, according to a new study.
The Voice of the Enterprise report by 451 Research and Digital Guardian on the use and consolidation of endpoint security tools found that the more endpoint security systems an enterprise has, the greater the cost of managing them. Security teams are struggling with inefficiency because theyre moving from dashboard to dashboard all day.
Eric Ogren, senior analyst with 451 Researchs information security team, says having more endpoint security tools doesnt necessarily provide better endpoint protection.
Overall spending on endpoint systems rose from 26.3% in 2015 to 29.4% in 2016, according to the study. The focus on risk was aligned with addressing an overall need for more skilled security professionals.
We hear so much about the labor shortage; how hard it is for security teams to hire and retain people, says Ogren. The problems not so much a people problem, but a technology one. Every time you tie an endpoint product to a workstation, its going to be noisy.
Researchers found
two-thirds of larger businesses juggle up to five endpoint security tools; about one in ten respondents handle as many as ten. The surplus is leading to greater operational overhead and additional steps to learn about data generated about users, applications, and OS activity. As a result, infosec teams are overwhelmed and ultimately fail to protect against data loss.
Endpoint security has traditionally been very threat- and exploit-oriented, and businesses invest in point products when new risks appear. These tools stay put for a long time because each was bought for a particular need. As a result, enterprises have accumulated several solutions for data loss prevention, data encryption, access controls, intrusion detection, and firewalls.
Every endpoint tool produces a lot of events and a lot of data, Ogren explains, and most of it is just junk. Security pros spend much of their time digging into, and clearing, endless alerts. They want to get trained on security and handling the business but don’t have time.
A data-focused approach
Researchers discovered a broad shift towards the consolidation of endpoint tools. Capabilities like disk encryption and host firewall/IDS, previously offered in individual products, are being incorporated into product suites or built into operating systems. The goal isnt only to remove silos between tools, but to create a more immediate view of threats to business data.
By consolidating endpoint systems, businesses can consistently collect accurate data and gain a broader view of their security posture without switching consoles. Leveraging analytics across large datasets can help monitor and prevent threats throughout an organization.
It tackles information debt straightaway, says Ogren of consolidation. Products have been a bit more comprehensive about their approach to security and what they import. What does get reported tends to be a lot more meaningful and a lot richer, with more analysis behind it.
The cloud is driving this trend, he notes, as businesses shift away from hardware-based products and toward cloud services. Hardware security tools made up 20% of security budgets one year ago compared with 17.9% today, and a predicted 17.1% in 2018, researchers found.
Bumps in the road
The shift to consolidation will have its obstacles, Ogren predicts. It will be difficult for security leaders to de-commit to a security problem by saying the business no longer needs a tool.
Some CISOs put their credibility and integrity on the line, and it takes maturity to say the world has moved on, this is how we need to approach security now, he explains.
Many will also face the challenge of moving from a threat-centric approach to endpoint security, and towards a data-centric approach. Security teams will have to look at how their resources are being used before they address threats.
451 Researchs Voice of the Enterprise study found the top three security pain points for the 12 months ending in June 2018 include user behavior (30.4%), accurate and timely monitoring of security events (21.8%), and staffing information security teams (20.7%).
Related Content:
10 Time-Consuming Tasks Security People Hate
CISOs Salaries Expected to Edge Above $240,000 in 2018
Ransomware is Going More Corporate, Less Consumer
Execs Underestimate Risks to Oracle EBS
Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for
more info
and to
register
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Endpoint Security Overload