12
Insights on Endpoint Security and Stealthy Threats Intel’s IT Manager Survey

Insights on endpoint security and stealthy threats

Embed Size (px)

DESCRIPTION

Wondering about endpoint security and rootkit attacks? Get insights from 400 IT managers (200 in the United States and 200 in the United Kingdom) on securing endpoint devices, addressing the risk of rootkits, and preferred security vendors. This report provides benchmarking data that you can use in your IT environment, including managing security for mobile and remote workers and recovering from a rootkit attack. You may already know that today’s threat landscape is increasingly dangerous because rootkits and other stealthy threats can evade traditional security measures. These threats are able to load before the operating system, which means they can load before antivirus protection. This research reveals that one in four IT managers has already experienced a rootkit attack, and as a result, has dealt with costly recovery and lost productivity across the organization. Another disturbing finding is that the time to detection for a rootkit attack is approximately one week—extremely high risk for any enterprise environment. Not surprisingly, gaining protection from malware and viruses was identified as the leading security effort for IT managers in the United States and United Kingdom. Read this report to find out how your peers are navigating today’s threats and learn which security vendors offer the most trusted protection.

Citation preview

Page 1: Insights on endpoint security and stealthy threats

Insights on Endpoint Security and Stealthy Threats

Intel’s IT Manager Survey

Page 2: Insights on endpoint security and stealthy threats

2 INTEL IT CENTER | Peer Research

400 IT Professionals: 200 U.S., 200 U.K.

IT Managers Speak Out

• Key security concerns for endpoint devices and mobile workers

• Perspective on consumerization and Bring Your Own Device (BYOD)

• Impact and high costs of rootkit attacks in the enterprise environment

• Top trusted security vendors for protecting against viruses and malware

Benchmarking data for your own IT initiatives:

Page 3: Insights on endpoint security and stealthy threats

3 INTEL IT CENTER | Peer Research

Top Five Findings

Securing endpoint devices, cloud computing, and consumerization are top concerns

Data protection is the leading concern for mobile workers

There is greater support for consumerization in the United States

One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents

Rootkits bring tough consequences—including a one-week detection time

1|

2|

3|

4|

5|

Page 4: Insights on endpoint security and stealthy threats

4 INTEL IT CENTER | Peer Research

Securing Endpoint Devices

Companies are supporting between 3K and 4K endpoint devices

Top concerns are endpoint device security, cloud, and consumerization

Consumerization is the leading concern for IT managers in the U.K.

Level of Security Concern % Very/Extremely Concerned

61%

62%

56%

Virtualization

Cloud computing

Consumerization/BYOD

Endpoint devices

Lack of IT control

Lack of IT visibility

52%

48%

37%

51%

60%

39%

42%

30%

36%

U.S. (n=200)

U.K. (n=200)

Page 5: Insights on endpoint security and stealthy threats

5 INTEL IT CENTER | Peer Research

Security Concerns for Mobile Workers

Four in five companies are supporting mobile and remote workers

Half of all respondents are concerned about the ability to maintain adequate levels of mobile security

Data protection is the leading concern for both countries

Specific Remote Security Concerns Among Those Supporting Remote Employees

62%

79%

55%

Loss of IT control

Data protection

Consequences of lostor stolen devices

Malware infection

Compliance breachor violation

48%

69%

61%

59%

47%

49%

52%

U.S. (n=164)

U.K. (n=170)

Page 6: Insights on endpoint security and stealthy threats

6 INTEL IT CENTER | Peer Research

Consumerization: Friend or Foe?

80 percent of IT managers in the United States support BYOD in the enterprise

32 percent of IT managers in the U.K. feel it shouldn’t be allowed in the enterprise

Leading perceptions are both positive and negative (remote connectivity, security risks)

BYOD Perception

56%

64%

40%

Boosts productivity

Creates a security risk

Allows employees to connect remotely

Improves employee morale

Lowers equipment cost

Should not be allowed

46%

20%

58%

42%

50%

38%

44%

36%

32%

U.S. (n=200)

U.K. (n=200)

Page 7: Insights on endpoint security and stealthy threats

7 INTEL IT CENTER | Peer Research

Experience with Stealthy Threats

One in four U.S. IT managers has experienced a rootkit attack—10 percent higher than reported by U.K.

Time to detection was approximately one week—spreading malware, impacting productivity

Led to changes to IT security

68%

68%

58%

End-user security awareness training

Ensure antivirus is updated

Password changes

Add additional security technologies

Enforce stricter Web usage policy

57%

67%

64%

60%

67%

64%

67%

U.S. (n=60)

U.K. (n=39)

Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack

Page 8: Insights on endpoint security and stealthy threats

8 INTEL IT CENTER | Peer Research

Rootkit Attacks Costly, Complex

Total cost of recovery estimated at $10K (U.S.) and often required reinstalling or reimaging the operating system

Approximately one-quarter of employees experienced an impact to productivity

Key differences noted based on attack experience

Significant Differences by Rootkit Attack Experience Yes

n=99No

n=301

Median endpoint security products deployed 4.0 2.7

Support multiple OS platforms 75% 51%

Concerned about mobile/remote security 63% 44%

Currentproductssufficientin protecting against rootkits

58% 41%

Rootkit Attack

Page 9: Insights on endpoint security and stealthy threats

9 INTEL IT CENTER | Peer Research

McAfee reported as the most commonly deployed endpoint security vendor

IT managers with rootkit attack experience more likely to use multiple security vendors

For rootkit prevention, Symantec, McAfee, and Microsoft ranked almost equally

Top Security Vendors

1

2

3

Page 10: Insights on endpoint security and stealthy threats

10 INTEL IT CENTER | Peer Research

Learn More

• Read the full research report, Insights on Endpoint Security and Stealthy Threats

• Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system:

intel.com/pcsecurity

mcafee.com/deepdefender

mcafee.com/deepcommand

Visit Intel.com/pcsecurityIntel.com/ITCenter

Visit McAfee.com

Page 11: Insights on endpoint security and stealthy threats

11 INTEL IT CENTER | Peer Research

Legal Disclaimers

TheinformationinthisdocumentisprovidedonlyforeducationalpurposesandfortheconvenienceofMcAfeeandIntelcustomers. Theinformation

contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the

informationtoanyspecificsituationorcircumstance. 

This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY

WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF

ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this

information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.

Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel

Corporation in the U.S. and other countries.

McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,

in the United States and other countries.

Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.

*Other names and brands may be claimed as the property of others.

Page 12: Insights on endpoint security and stealthy threats