![The Edge Logo The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Digging into data about the latest attacks, threats, and trends using charts and tables.
What Is an 'Endpoint'?
Some companies' endpoint security strategies may now cover an ever-widening array of devices, as Dark Reading's latest "State of Endpoint Security" survey discovered.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4f97c96e90431622/64f0d08f8e08df9c629424c6/EndpointDefined_2020Report.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
While respondents to Dark Reading's "2020 Endpoint Security" survey are generally in agreement that end-user workstations and end-user laptops should be included in the definition of the term "endpoint device," a long list of other network-connected devices also passed the test.
Most respondents include corporate-issued smartphones (75%) and employee-owned bring-your-own-device (BYOD) smartphones (66%) in their endpoint definition, and 53% also include consumer Internet of Things (IoT) devices.
Respondents also extend the word "endpoint" beyond the end user. Point-of-sale systems (65%), corporate networked printers (63%), corporate servers (59%), industrial IoT devices (55%), medical IoT devices (49%), and routers (34%) made the cut. Nearly half (49%) also count remote workers’ networked devices (printers/routers).
Using these broad definitions, most respondents (56%) still say they manage fewer than 1,000 endpoints, but 5% of organizations estimate they have 100 or even 1,000 times as many.
Read the full report here.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024