Upload
intel-it-center
View
402
Download
4
Embed Size (px)
DESCRIPTION
Wondering about endpoint security and rootkit attacks? Get insights from 400 IT managers (200 in the United States and 200 in the United Kingdom) on securing endpoint devices, addressing the risk of rootkits, and preferred security vendors. This report provides benchmarking data that you can use in your IT environment, including managing security for mobile and remote workers and recovering from a rootkit attack. You may already know that today’s threat landscape is increasingly dangerous because rootkits and other stealthy threats can evade traditional security measures. These threats are able to load before the operating system, which means they can load before antivirus protection. This research reveals that one in four IT managers has already experienced a rootkit attack, and as a result, has dealt with costly recovery and lost productivity across the organization. Another disturbing finding is that the time to detection for a rootkit attack is approximately one week—extremely high risk for any enterprise environment. Not surprisingly, gaining protection from malware and viruses was identified as the leading security effort for IT managers in the United States and United Kingdom. Read this report to find out how your peers are navigating today’s threats and learn which security vendors offer the most trusted protection.
Citation preview
Insights on Endpoint Security and Stealthy Threats
Intel’s IT Manager Survey
2 INTEL IT CENTER | Peer Research
400 IT Professionals: 200 U.S., 200 U.K.
IT Managers Speak Out
• Key security concerns for endpoint devices and mobile workers
• Perspective on consumerization and Bring Your Own Device (BYOD)
• Impact and high costs of rootkit attacks in the enterprise environment
• Top trusted security vendors for protecting against viruses and malware
Benchmarking data for your own IT initiatives:
3 INTEL IT CENTER | Peer Research
Top Five Findings
Securing endpoint devices, cloud computing, and consumerization are top concerns
Data protection is the leading concern for mobile workers
There is greater support for consumerization in the United States
One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents
Rootkits bring tough consequences—including a one-week detection time
1|
2|
3|
4|
5|
4 INTEL IT CENTER | Peer Research
Securing Endpoint Devices
Companies are supporting between 3K and 4K endpoint devices
Top concerns are endpoint device security, cloud, and consumerization
Consumerization is the leading concern for IT managers in the U.K.
Level of Security Concern % Very/Extremely Concerned
61%
62%
56%
Virtualization
Cloud computing
Consumerization/BYOD
Endpoint devices
Lack of IT control
Lack of IT visibility
52%
48%
37%
51%
60%
39%
42%
30%
36%
U.S. (n=200)
U.K. (n=200)
5 INTEL IT CENTER | Peer Research
Security Concerns for Mobile Workers
Four in five companies are supporting mobile and remote workers
Half of all respondents are concerned about the ability to maintain adequate levels of mobile security
Data protection is the leading concern for both countries
Specific Remote Security Concerns Among Those Supporting Remote Employees
62%
79%
55%
Loss of IT control
Data protection
Consequences of lostor stolen devices
Malware infection
Compliance breachor violation
48%
69%
61%
59%
47%
49%
52%
U.S. (n=164)
U.K. (n=170)
6 INTEL IT CENTER | Peer Research
Consumerization: Friend or Foe?
80 percent of IT managers in the United States support BYOD in the enterprise
32 percent of IT managers in the U.K. feel it shouldn’t be allowed in the enterprise
Leading perceptions are both positive and negative (remote connectivity, security risks)
BYOD Perception
56%
64%
40%
Boosts productivity
Creates a security risk
Allows employees to connect remotely
Improves employee morale
Lowers equipment cost
Should not be allowed
46%
20%
58%
42%
50%
38%
44%
36%
32%
U.S. (n=200)
U.K. (n=200)
7 INTEL IT CENTER | Peer Research
Experience with Stealthy Threats
One in four U.S. IT managers has experienced a rootkit attack—10 percent higher than reported by U.K.
Time to detection was approximately one week—spreading malware, impacting productivity
Led to changes to IT security
68%
68%
58%
End-user security awareness training
Ensure antivirus is updated
Password changes
Add additional security technologies
Enforce stricter Web usage policy
57%
67%
64%
60%
67%
64%
67%
U.S. (n=60)
U.K. (n=39)
Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack
8 INTEL IT CENTER | Peer Research
Rootkit Attacks Costly, Complex
Total cost of recovery estimated at $10K (U.S.) and often required reinstalling or reimaging the operating system
Approximately one-quarter of employees experienced an impact to productivity
Key differences noted based on attack experience
Significant Differences by Rootkit Attack Experience Yes
n=99No
n=301
Median endpoint security products deployed 4.0 2.7
Support multiple OS platforms 75% 51%
Concerned about mobile/remote security 63% 44%
Currentproductssufficientin protecting against rootkits
58% 41%
Rootkit Attack
9 INTEL IT CENTER | Peer Research
McAfee reported as the most commonly deployed endpoint security vendor
IT managers with rootkit attack experience more likely to use multiple security vendors
For rootkit prevention, Symantec, McAfee, and Microsoft ranked almost equally
Top Security Vendors
1
2
3
10 INTEL IT CENTER | Peer Research
Learn More
• Read the full research report, Insights on Endpoint Security and Stealthy Threats
• Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system:
intel.com/pcsecurity
mcafee.com/deepdefender
mcafee.com/deepcommand
Visit Intel.com/pcsecurityIntel.com/ITCenter
Visit McAfee.com
11 INTEL IT CENTER | Peer Research
Legal Disclaimers
TheinformationinthisdocumentisprovidedonlyforeducationalpurposesandfortheconvenienceofMcAfeeandIntelcustomers. Theinformation
contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the
informationtoanyspecificsituationorcircumstance.
This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF
ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.
Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel
Corporation in the U.S. and other countries.
McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,
in the United States and other countries.
Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.