SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Insights on Endpoint Security
and Stealthy Threats

               Intel’s IT Manager Survey
IT Managers Speak Out
400 IT Professionals: 200 U.S., 200 U.K.




        Benchmarking data for your own IT initiatives:

        •	 Key security concerns for endpoint devices and mobile workers
        •	 Perspective on consumerization and Bring Your Own Device (BYOD)
        •	 Impact and high costs of rootkit attacks in the enterprise environment
        •	 Top trusted security vendors for protecting against viruses and malware




2    INTEL IT CENTER | Peer Research
Top Five Findings

        1|             Securing endpoint devices, cloud computing,
                       and consumerization are top concerns


        2|             Data protection is the leading concern
                       for mobile workers


        3|             There is greater support for consumerization
                       in the United States


        4|             One in four IT managers in the United States has experienced
                       a rootkit attack—10 percent higher than reported by U.K. respondents


        5|             Rootkits bring tough consequences—including
                       a one-week detection time


3   INTEL IT CENTER | Peer Research
Securing Endpoint Devices

                                                                       Level of Security Concern
                                                                            % Very/Extremely Concerned
    Companies are supporting
    between 3K and 4K
                                                                                                                          62%
    endpoint devices                          Cloud computing
                                                                                               37%

                                                                                                                          61%
                                        Consumerization/BYOD
                                                                                                             51%

    Top concerns are endpoint                                                                                             60%
                                             Endpoint devices
    device security, cloud,	                                                                    39%

    and consumerization                      Lack of IT control
                                                                                                                    56%
                                                                                                      42%

                                                                                                                  52%
                                                 Virtualization
                                                                                         30%
    Consumerization is the
    leading concern for IT                  Lack of IT visibility
                                                                                                            48%
                                                                                               36%
    managers in the U.K.

                                                                    U.S. (n=200)
                                                                    U.K. (n=200)




4     INTEL IT CENTER | Peer Research
Security Concerns for Mobile Workers

    Four in five companies                                       Specific Remote Security Concerns
                                                                    Among Those Supporting Remote Employees
    are supporting mobile
    and remote workers
                                                                                                                                79%
                                             Data protection
                                                                                                                          69%


    Half of all respondents             Consequences of lost                                                        62%
                                            or stolen devices                                                      61%
    are concerned about the
    ability to maintain adequate           Malware infection
                                                                                               47%
                                                                                                               59%


    levels of mobile security
                                          Compliance breach                                                  55%
                                                 or violation                                    49%

                                                                                                48%
                                           Loss of IT control
    Data protection is the                                                                             52%

    leading concern for
    both countries                                              U.S. (n=164)
                                                                U.K. (n=170)




5     INTEL IT CENTER | Peer Research
Consumerization: Friend or Foe?

    80 percent of IT managers                                                         BYOD Perception
    in the United States
    support BYOD in                                    Creates a security risk
                                                                                                                                          64%
                                                                                                                                    58%
    the enterprise
                                                                                                                                    56%
                                        Allows employees to connect remotely
                                                                                                                  42%


    32 percent of IT managers in                  Improves employee morale
                                                                                                            38%
                                                                                                                              50%


    the U.K. feel it shouldn’t be
                                                                                                                  40%
    allowed in the enterprise                         Lowers equipment cost
                                                                                                                    44%

                                                                                                                        46%
                                                         Boosts productivity
                                                                                                            36%

    Leading perceptions are                                                                     20%
                                                       Should not be allowed
    both positive and negative                                                                        32%

    (remote connectivity,
    security risks)                                                              U.S. (n=200)
                                                                                 U.K. (n=200)




6     INTEL IT CENTER | Peer Research
Experience with Stealthy Threats

    One in four U.S.                                                      Changes Due to Rootkit Attack
                                                                            Among Those Experiencing Rootkit Attack
    IT managers has
    experienced a rootkit
    attack—10 percent higher                     Ensure antivirus is updated
                                                                                                                               68%
                                                                                                                              67%
    than reported by U.K.
                                                                                                                               68%
                                                          Password changes
                                                                                                                              64%

                                                                                                                        60%
    Time to detection was                Add additional security technologies
                                                                                                                              67%
    approximately one week—                                                                                            58%
    spreading malware,                     Enforce stricter Web usage policy
                                                                                                                              64%

    impacting productivity                                                                                            57%
                                        End-user security awareness training
                                                                                                                              67%




    Led to changes                                                              U.S. (n=60)
    to IT security                                                              U.K. (n=39)




7     INTEL IT CENTER | Peer Research
Rootkit Attacks Costly, Complex

    Total cost of recovery
    estimated at $10K
                                                                                      Rootkit Attack
    (U.S.) and often required           Significant Differences
                                        by Rootkit Attack Experience                  Yes       No
    reinstalling or reimaging                                                        n=99     n=301
    the operating system
                                        Median endpoint security products deployed    4.0        2.7


    Approximately one-quarter           Support multiple OS platforms                75%        51%
    of employees experienced an
    impact to productivity              Concerned about mobile/remote security       63%        44%


                                        Current products sufficient in
                                                                                     58%        41%
    Key differences noted based         protecting against rootkits
    on attack experience




8     INTEL IT CENTER | Peer Research
Top Security Vendors

                     For rootkit prevention, Symantec, McAfee,
         1
                     and Microsoft ranked almost equally



                     IT managers with rootkit attack experience more
         2
                     likely to use multiple security vendors



                     McAfee reported as the most commonly deployed
         3
                     endpoint security vendor




9   INTEL IT CENTER | Peer Research
Learn More


                                       •	 Read the full research report,
                                          Insights on Endpoint Security
                                          and Stealthy Threats
                                       •	 Find out more about Intel® and
                                          McAfee® security solutions designed
                                          to prevent stealthy threats beyond
                                          the operating system:

                                          intel.com/pcsecurity
                                          mcafee.com/deepdefender
                                          mcafee.com/deepcommand



       Visit Intel.com/pcsecurity               Visit McAfee.com
                 Intel.com/ITCenter



10   INTEL IT CENTER | Peer Research
Legal Disclaimers
The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information
contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the
information to any specific situation or circumstance. 

This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF
ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.

Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel
Corporation in the U.S. and other countries.

McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,
in the United States and other countries.

Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.

*Other names and brands may be claimed as the property of others.




11       INTEL IT CENTER | Peer Research
Insights on endpoint security and stealthy threats

Mais conteúdo relacionado

Mais de Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Mais de Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Insights on endpoint security and stealthy threats

  • 1. Insights on Endpoint Security and Stealthy Threats Intel’s IT Manager Survey
  • 2. IT Managers Speak Out 400 IT Professionals: 200 U.S., 200 U.K. Benchmarking data for your own IT initiatives: • Key security concerns for endpoint devices and mobile workers • Perspective on consumerization and Bring Your Own Device (BYOD) • Impact and high costs of rootkit attacks in the enterprise environment • Top trusted security vendors for protecting against viruses and malware 2 INTEL IT CENTER | Peer Research
  • 3. Top Five Findings 1| Securing endpoint devices, cloud computing, and consumerization are top concerns 2| Data protection is the leading concern for mobile workers 3| There is greater support for consumerization in the United States 4| One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents 5| Rootkits bring tough consequences—including a one-week detection time 3 INTEL IT CENTER | Peer Research
  • 4. Securing Endpoint Devices Level of Security Concern % Very/Extremely Concerned Companies are supporting between 3K and 4K 62% endpoint devices Cloud computing 37% 61% Consumerization/BYOD 51% Top concerns are endpoint 60% Endpoint devices device security, cloud, 39% and consumerization Lack of IT control 56% 42% 52% Virtualization 30% Consumerization is the leading concern for IT Lack of IT visibility 48% 36% managers in the U.K. U.S. (n=200) U.K. (n=200) 4 INTEL IT CENTER | Peer Research
  • 5. Security Concerns for Mobile Workers Four in five companies Specific Remote Security Concerns Among Those Supporting Remote Employees are supporting mobile and remote workers 79% Data protection 69% Half of all respondents Consequences of lost 62% or stolen devices 61% are concerned about the ability to maintain adequate Malware infection 47% 59% levels of mobile security Compliance breach 55% or violation 49% 48% Loss of IT control Data protection is the 52% leading concern for both countries U.S. (n=164) U.K. (n=170) 5 INTEL IT CENTER | Peer Research
  • 6. Consumerization: Friend or Foe? 80 percent of IT managers BYOD Perception in the United States support BYOD in Creates a security risk 64% 58% the enterprise 56% Allows employees to connect remotely 42% 32 percent of IT managers in Improves employee morale 38% 50% the U.K. feel it shouldn’t be 40% allowed in the enterprise Lowers equipment cost 44% 46% Boosts productivity 36% Leading perceptions are 20% Should not be allowed both positive and negative 32% (remote connectivity, security risks) U.S. (n=200) U.K. (n=200) 6 INTEL IT CENTER | Peer Research
  • 7. Experience with Stealthy Threats One in four U.S. Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack IT managers has experienced a rootkit attack—10 percent higher Ensure antivirus is updated 68% 67% than reported by U.K. 68% Password changes 64% 60% Time to detection was Add additional security technologies 67% approximately one week— 58% spreading malware, Enforce stricter Web usage policy 64% impacting productivity 57% End-user security awareness training 67% Led to changes U.S. (n=60) to IT security U.K. (n=39) 7 INTEL IT CENTER | Peer Research
  • 8. Rootkit Attacks Costly, Complex Total cost of recovery estimated at $10K Rootkit Attack (U.S.) and often required Significant Differences by Rootkit Attack Experience Yes No reinstalling or reimaging n=99 n=301 the operating system Median endpoint security products deployed 4.0 2.7 Approximately one-quarter Support multiple OS platforms 75% 51% of employees experienced an impact to productivity Concerned about mobile/remote security 63% 44% Current products sufficient in 58% 41% Key differences noted based protecting against rootkits on attack experience 8 INTEL IT CENTER | Peer Research
  • 9. Top Security Vendors For rootkit prevention, Symantec, McAfee, 1 and Microsoft ranked almost equally IT managers with rootkit attack experience more 2 likely to use multiple security vendors McAfee reported as the most commonly deployed 3 endpoint security vendor 9 INTEL IT CENTER | Peer Research
  • 10. Learn More • Read the full research report, Insights on Endpoint Security and Stealthy Threats • Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system: intel.com/pcsecurity mcafee.com/deepdefender mcafee.com/deepcommand Visit Intel.com/pcsecurity Visit McAfee.com Intel.com/ITCenter 10 INTEL IT CENTER | Peer Research
  • 11. Legal Disclaimers The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.  This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and other countries. McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc., in the United States and other countries. Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others. 11 INTEL IT CENTER | Peer Research