Insights on endpoint security and stealthy threats


Published on

Wondering about endpoint security and rootkit attacks? Get insights from 400 IT managers (200 in the United States and 200 in the United Kingdom) on securing endpoint devices, addressing the risk of rootkits, and preferred security vendors. This report provides benchmarking data that you can use in your IT environment, including managing security for mobile and remote workers and recovering from a rootkit attack. You may already know that today’s threat landscape is increasingly dangerous because rootkits and other stealthy threats can evade traditional security measures. These threats are able to load before the operating system, which means they can load before antivirus protection. This research reveals that one in four IT managers has already experienced a rootkit attack, and as a result, has dealt with costly recovery and lost productivity across the organization. Another disturbing finding is that the time to detection for a rootkit attack is approximately one week—extremely high risk for any enterprise environment. Not surprisingly, gaining protection from malware and viruses was identified as the leading security effort for IT managers in the United States and United Kingdom. Read this report to find out how your peers are navigating today’s threats and learn which security vendors offer the most trusted protection.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Insights on endpoint security and stealthy threats

  1. 1. Insights on Endpoint Securityand Stealthy Threats Intel’s IT Manager Survey
  2. 2. IT Managers Speak Out400 IT Professionals: 200 U.S., 200 U.K. Benchmarking data for your own IT initiatives: • Key security concerns for endpoint devices and mobile workers • Perspective on consumerization and Bring Your Own Device (BYOD) • Impact and high costs of rootkit attacks in the enterprise environment • Top trusted security vendors for protecting against viruses and malware2 INTEL IT CENTER | Peer Research
  3. 3. Top Five Findings 1| Securing endpoint devices, cloud computing, and consumerization are top concerns 2| Data protection is the leading concern for mobile workers 3| There is greater support for consumerization in the United States 4| One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents 5| Rootkits bring tough consequences—including a one-week detection time3 INTEL IT CENTER | Peer Research
  4. 4. Securing Endpoint Devices Level of Security Concern % Very/Extremely Concerned Companies are supporting between 3K and 4K 62% endpoint devices Cloud computing 37% 61% Consumerization/BYOD 51% Top concerns are endpoint 60% Endpoint devices device security, cloud, 39% and consumerization Lack of IT control 56% 42% 52% Virtualization 30% Consumerization is the leading concern for IT Lack of IT visibility 48% 36% managers in the U.K. U.S. (n=200) U.K. (n=200)4 INTEL IT CENTER | Peer Research
  5. 5. Security Concerns for Mobile Workers Four in five companies Specific Remote Security Concerns Among Those Supporting Remote Employees are supporting mobile and remote workers 79% Data protection 69% Half of all respondents Consequences of lost 62% or stolen devices 61% are concerned about the ability to maintain adequate Malware infection 47% 59% levels of mobile security Compliance breach 55% or violation 49% 48% Loss of IT control Data protection is the 52% leading concern for both countries U.S. (n=164) U.K. (n=170)5 INTEL IT CENTER | Peer Research
  6. 6. Consumerization: Friend or Foe? 80 percent of IT managers BYOD Perception in the United States support BYOD in Creates a security risk 64% 58% the enterprise 56% Allows employees to connect remotely 42% 32 percent of IT managers in Improves employee morale 38% 50% the U.K. feel it shouldn’t be 40% allowed in the enterprise Lowers equipment cost 44% 46% Boosts productivity 36% Leading perceptions are 20% Should not be allowed both positive and negative 32% (remote connectivity, security risks) U.S. (n=200) U.K. (n=200)6 INTEL IT CENTER | Peer Research
  7. 7. Experience with Stealthy Threats One in four U.S. Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack IT managers has experienced a rootkit attack—10 percent higher Ensure antivirus is updated 68% 67% than reported by U.K. 68% Password changes 64% 60% Time to detection was Add additional security technologies 67% approximately one week— 58% spreading malware, Enforce stricter Web usage policy 64% impacting productivity 57% End-user security awareness training 67% Led to changes U.S. (n=60) to IT security U.K. (n=39)7 INTEL IT CENTER | Peer Research
  8. 8. Rootkit Attacks Costly, Complex Total cost of recovery estimated at $10K Rootkit Attack (U.S.) and often required Significant Differences by Rootkit Attack Experience Yes No reinstalling or reimaging n=99 n=301 the operating system Median endpoint security products deployed 4.0 2.7 Approximately one-quarter Support multiple OS platforms 75% 51% of employees experienced an impact to productivity Concerned about mobile/remote security 63% 44% Current products sufficient in 58% 41% Key differences noted based protecting against rootkits on attack experience8 INTEL IT CENTER | Peer Research
  9. 9. Top Security Vendors For rootkit prevention, Symantec, McAfee, 1 and Microsoft ranked almost equally IT managers with rootkit attack experience more 2 likely to use multiple security vendors McAfee reported as the most commonly deployed 3 endpoint security vendor9 INTEL IT CENTER | Peer Research
  10. 10. Learn More • Read the full research report, Insights on Endpoint Security and Stealthy Threats • Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system: Visit Visit INTEL IT CENTER | Peer Research
  11. 11. Legal DisclaimersThe information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The informationcontained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of theinformation to any specific situation or circumstance. This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANYWARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OFANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of thisinformation. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of IntelCorporation in the U.S. and other countries.McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,in the United States and other countries.Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.*Other names and brands may be claimed as the property of others.11 INTEL IT CENTER | Peer Research
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.