Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/5/2017
11:40 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Endpoint Security Overload

CISOs and their teams are over-investing in endpoint security tools, driving inefficiency and a need to consolidate data.

An excess of endpoint security tools in organizations is driving "information security debt," according to a new study.

The "Voice of the Enterprise" report by 451 Research and Digital Guardian on the use and consolidation of endpoint security tools found that the more endpoint security systems an enterprise has, the greater the cost of managing them. Security teams are struggling with inefficiency because they're moving from dashboard to dashboard all day.

Eric Ogren, senior analyst with 451 Research's information security team, says having more endpoint security tools doesn't necessarily provide better endpoint protection.

Overall spending on endpoint systems rose from 26.3% in 2015 to 29.4% in 2016, according to the study. The focus on risk was aligned with addressing an overall need for more skilled security professionals.

"We hear so much about the labor shortage; how hard it is for security teams to hire and retain people," says Ogren. "The problem's not so much a people problem, but a technology one. Every time you tie an endpoint product to a workstation, it's going to be noisy."

Researchers found two-thirds of larger businesses juggle up to five endpoint security tools; about one in ten respondents handle as many as ten. The surplus is leading to greater operational overhead and additional steps to learn about data generated about users, applications, and OS activity. As a result, infosec teams are overwhelmed and ultimately fail to protect against data loss.

Endpoint security has traditionally been very threat- and exploit-oriented, and businesses invest in point products when new risks appear. These tools stay put for a long time because each was bought for a particular need. As a result, enterprises have accumulated several solutions for data loss prevention, data encryption, access controls, intrusion detection, and firewalls.

Every endpoint tool produces a lot of events and a lot of data, Ogren explains, and "most of it is just junk." Security pros spend much of their time digging into, and clearing, endless alerts. They want to get trained on security and handling the business but don’t have time.

A data-focused approach

Researchers discovered a broad shift towards the consolidation of endpoint tools. Capabilities like disk encryption and host firewall/IDS, previously offered in individual products, are being incorporated into product suites or built into operating systems. The goal isn't only to remove silos between tools, but to create a more immediate view of threats to business data.

By consolidating endpoint systems, businesses can consistently collect accurate data and gain a broader view of their security posture without switching consoles. Leveraging analytics across large datasets can help monitor and prevent threats throughout an organization.

"It tackles information debt straightaway," says Ogren of consolidation. "Products have been a bit more comprehensive about their approach to security and what they import. What does get reported tends to be a lot more meaningful and a lot richer, with more analysis behind it."

The cloud is driving this trend, he notes, as businesses shift away from hardware-based products and toward cloud services. Hardware security tools made up 20% of security budgets one year ago compared with 17.9% today, and a predicted 17.1% in 2018, researchers found.

Bumps in the road

The shift to consolidation will have its obstacles, Ogren predicts. It will be difficult for security leaders to "de-commit" to a security problem by saying the business no longer needs a tool.

"Some CISOs put their credibility and integrity on the line, and it takes maturity to say 'the world has moved on, this is how we need to approach security now,'" he explains.

Many will also face the challenge of moving from a threat-centric approach to endpoint security, and towards a data-centric approach. Security teams will have to look at how their resources are being used before they address threats.

451 Research's Voice of the Enterprise study found the top three security pain points for the 12 months ending in June 2018 include user behavior (30.4%), accurate and timely monitoring of security events (21.8%), and staffing information security teams (20.7%).

Related Content:

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
LouiseMiller
50%
50%
LouiseMiller,
User Rank: Apprentice
10/10/2017 | 9:07:29 AM
Interesting
Very interesting post, as for me) 
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2016-4606
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...