Wondering about endpoint security and rootkit attacks? Get insights from 400 IT managers (200 in the United States and 200 in the United Kingdom) on securing endpoint devices, addressing the risk of rootkits, and preferred security vendors. This report provides benchmarking data that you can use in your IT environment, including managing security for mobile and remote workers and recovering from a rootkit attack. You may already know that today’s threat landscape is increasingly dangerous because rootkits and other stealthy threats can evade traditional security measures. These threats are able to load before the operating system, which means they can load before antivirus protection. This research reveals that one in four IT managers has already experienced a rootkit attack, and as a result, has dealt with costly recovery and lost productivity across the organization. Another disturbing finding is that the time to detection for a rootkit attack is approximately one week—extremely high risk for any enterprise environment. Not surprisingly, gaining protection from malware and viruses was identified as the leading security effort for IT managers in the United States and United Kingdom. Read this report to find out how your peers are navigating today’s threats and learn which security vendors offer the most trusted protection.
2. IT Managers Speak Out
400 IT Professionals: 200 U.S., 200 U.K.
Benchmarking data for your own IT initiatives:
• Key security concerns for endpoint devices and mobile workers
• Perspective on consumerization and Bring Your Own Device (BYOD)
• Impact and high costs of rootkit attacks in the enterprise environment
• Top trusted security vendors for protecting against viruses and malware
2 INTEL IT CENTER | Peer Research
3. Top Five Findings
1| Securing endpoint devices, cloud computing,
and consumerization are top concerns
2| Data protection is the leading concern
for mobile workers
3| There is greater support for consumerization
in the United States
4| One in four IT managers in the United States has experienced
a rootkit attack—10 percent higher than reported by U.K. respondents
5| Rootkits bring tough consequences—including
a one-week detection time
3 INTEL IT CENTER | Peer Research
4. Securing Endpoint Devices
Level of Security Concern
% Very/Extremely Concerned
Companies are supporting
between 3K and 4K
62%
endpoint devices Cloud computing
37%
61%
Consumerization/BYOD
51%
Top concerns are endpoint 60%
Endpoint devices
device security, cloud, 39%
and consumerization Lack of IT control
56%
42%
52%
Virtualization
30%
Consumerization is the
leading concern for IT Lack of IT visibility
48%
36%
managers in the U.K.
U.S. (n=200)
U.K. (n=200)
4 INTEL IT CENTER | Peer Research
5. Security Concerns for Mobile Workers
Four in five companies Specific Remote Security Concerns
Among Those Supporting Remote Employees
are supporting mobile
and remote workers
79%
Data protection
69%
Half of all respondents Consequences of lost 62%
or stolen devices 61%
are concerned about the
ability to maintain adequate Malware infection
47%
59%
levels of mobile security
Compliance breach 55%
or violation 49%
48%
Loss of IT control
Data protection is the 52%
leading concern for
both countries U.S. (n=164)
U.K. (n=170)
5 INTEL IT CENTER | Peer Research
6. Consumerization: Friend or Foe?
80 percent of IT managers BYOD Perception
in the United States
support BYOD in Creates a security risk
64%
58%
the enterprise
56%
Allows employees to connect remotely
42%
32 percent of IT managers in Improves employee morale
38%
50%
the U.K. feel it shouldn’t be
40%
allowed in the enterprise Lowers equipment cost
44%
46%
Boosts productivity
36%
Leading perceptions are 20%
Should not be allowed
both positive and negative 32%
(remote connectivity,
security risks) U.S. (n=200)
U.K. (n=200)
6 INTEL IT CENTER | Peer Research
7. Experience with Stealthy Threats
One in four U.S. Changes Due to Rootkit Attack
Among Those Experiencing Rootkit Attack
IT managers has
experienced a rootkit
attack—10 percent higher Ensure antivirus is updated
68%
67%
than reported by U.K.
68%
Password changes
64%
60%
Time to detection was Add additional security technologies
67%
approximately one week— 58%
spreading malware, Enforce stricter Web usage policy
64%
impacting productivity 57%
End-user security awareness training
67%
Led to changes U.S. (n=60)
to IT security U.K. (n=39)
7 INTEL IT CENTER | Peer Research
8. Rootkit Attacks Costly, Complex
Total cost of recovery
estimated at $10K
Rootkit Attack
(U.S.) and often required Significant Differences
by Rootkit Attack Experience Yes No
reinstalling or reimaging n=99 n=301
the operating system
Median endpoint security products deployed 4.0 2.7
Approximately one-quarter Support multiple OS platforms 75% 51%
of employees experienced an
impact to productivity Concerned about mobile/remote security 63% 44%
Current products sufficient in
58% 41%
Key differences noted based protecting against rootkits
on attack experience
8 INTEL IT CENTER | Peer Research
9. Top Security Vendors
For rootkit prevention, Symantec, McAfee,
1
and Microsoft ranked almost equally
IT managers with rootkit attack experience more
2
likely to use multiple security vendors
McAfee reported as the most commonly deployed
3
endpoint security vendor
9 INTEL IT CENTER | Peer Research
10. Learn More
• Read the full research report,
Insights on Endpoint Security
and Stealthy Threats
• Find out more about Intel® and
McAfee® security solutions designed
to prevent stealthy threats beyond
the operating system:
intel.com/pcsecurity
mcafee.com/deepdefender
mcafee.com/deepcommand
Visit Intel.com/pcsecurity Visit McAfee.com
Intel.com/ITCenter
10 INTEL IT CENTER | Peer Research