Accessibility Links

Endpoint Security

Date: 22 August 2017

Is the Endpoint Security Space Too Crowded?

There are a number of must-haves any endpoint security solution should offer: rapid prevention capabilities; real-time information; massive scalability; integrated sandboxing; and data management to name a few. However, in an over-crowded market it’s becoming increasingly challenging for businesses to see past the noise and remain unique in the endpoint space.

Endpoint security is as important as ever. According to a Piper Jaffray survey, 78% CIOs cited endpoint security as their top priority.1 A survey commissioned by Guidance Software revealed that 72% of businesses are planning to increase their endpoint security spend over the coming year.2 Of those, 27% see endpoint detection and response (EDR) as the most critical security control.

As cybercriminals find more innovative and sophisticated ways to attack businesses, organizations need more innovative and sophisticated ways to respond. Last year, Yahoo, LinkedIn and Tumblr were all targeted by hackers, and this year, Verizon, AA and Virgin Media are among the victims.

Why is Endpoint Security So Important?

Endpoint security tackles the risks created by devices connected to an enterprise network. These devices (or endpoints) include mobile devices, laptops and desktop PCs, but endpoints also comprise hardware – servers in a data center, for example.

All of these devices present entry points for threats; endpoint security works to secure each endpoint, monitor irregular activity, and block potential attacks. And as more businesses adopt BYOD and remote working practices, the need for effective endpoint security continues to accelerate.

Endpoint security goes beyond existing security measures by offering additional protection at each entry point. By ensuring every device meets security standards, businesses can gain greater control over entry points and enhance protection against threats.

Endpoints continue to be the most attractive targets for cyber criminals. If a security breach does occur, the endpoint holds a wealth of information about an attack. EDR tools gather and store that data to gain intelligence about that attack and help prevent future invasions.

To meet this growing demand, a new generation of endpoint security providers is moving away from the prevention approach of anti-virus software to detection and response at the entry point of endpoint security.

Why is the Endpoint Security Space So Crowded?

According to Ponemon Institute’s 2017 Cost of Data Breach Study, the average cost of a data breach fell 10% over previous years to $3.62 million, yet the scale and scope of these attacks has grown.3

The number of malicious programs is also on the rise — the AV-TEST Institute registers 390,000 new malicious programs every day.4 Grand View Research Inc predicts the endpoint security market will increase from $10.12 billion in 2015 to $27.05 billion by 2024.5 A surge of next generation endpoint security start-ups has emerged in recent years. This has piqued the interest of venture capitalists and there is currently a lot of money within the space.

In response to this, veteran security giants are also upping their game, updating their offerings and reinventing themselves. Big names such as Trend Micro, McAfee and Symantec have all announced new products and acquisitions in an effort to counter the growing pressure within the space. In an already highly competitive landscape, the increased competition is predicted to grow over the coming months and years.

How are Companies Responding?

EDR covers everything from detecting unpatched bugs and suspicious activity to isolating, investigating and remediating the breach and sharing intelligence about the attack with the rest of the network.

However, many businesses are stopping short of full-blown adoption of EDR tools preferring to use EDR products to enhance their existing traditional endpoint security instead.

Endpoint security providers are therefore working hard to be unique in the crowded market. There are a number of variations in endpoints which providers are focusing on, including instant response, firewall, and next-gen firewall. More technologies are being introduced into endpoint protection products, such as machine learning, exploit mitigation and behavior analysis.

According to Gartner, 80% of endpoint protection platforms will incorporate forensics capabilities and user activity monitoring by 2018 — up from just 5% in 2013.6 Providers are recognizing the need for technical innovation in their products — and the talent to make it happen.

How to Attract Top Talent

If you are one of the growing number of endpoint protection providers, the most effective way to attract the best talent is by showing you have a top line, unique product that brings something to new the market.

Add to that a company culture that gives employees the flexibility they desire, a salary that is at least market average (i.e. between $130 and $150K base), and the opportunity to be a key player within the organization and you will find you can attract (and more importantly, retain) the most desirable talent out there.

How to Last as a Candidate in the Endpoint Space

Endpoint security is one of the hottest spaces to be in and this acts as a pull for many jobseekers. However, for some candidates, the idea of entering (and then lasting in) the endpoint space can feel daunting.

The space can vary immensely, so for technical candidates (sales engineers and solution architects) experience of working with specific endpoints such as firewall or incident response or technologies such as behavior analytics are hugely important.

On the sales side (sales managers and account executives), candidates need to be top performers in their field with experience of building out territories, managing the entire sales process and not having to rely on others for leads.

No business wants to be a hacker’s next victim meaning endpoint security will continue to grow in importance in today’s business landscape. If you’re looking to recruit in the endpoint protection space, or you’re ready to take the next step in your security career, contact the team at Glocomms today.

References

https://piper2.bluematrix.com/sellside/EmailDocViewer?encrypt=7856c68e-3f1a-4ce9-a7e7-99fe25145cd9&mime=pdf&co=Piper&id=jyarow@businessinsider.com&source=mail

https://www.darkreading.com/endpoint/72--ofbusinesses-plan-for-endpoint-security-budget-boost/d/d-id/1329517    

https://www.ibm.com/security/data-breach/

https://www.av-test.org/en/statistics/malware/

http://www.grandviewresearch.com/press-release/global-endpoint-security-market

http://www.gartner.com/imagesrv/mediaproducts/pdf/ahnlab/ahnlab-1-3AGQT2I.pdf

Tagged In: Glocomms
Add new comment
*
*
*