The rapid transformation of the digital landscape and the proliferation of new business models are bringing sweeping changes to IT organizations everywhere. In order to keep up with the accelerating cycles of change and keep your company safe in an increasingly hostile threat landscape, your organization’s endpoint protection strategy must evolve.
In this interactive webinar, Eric Ogren, Senior Security Analyst at 451 Research and Gajraj Singh, VP of Product Marketing at Tripwire will provide insight into proactive steps you can take to improve your endpoint security.
Topics include:
• The top three things you can do today to improve the effectiveness of your endpoint security program.
• How to gain sufficient endpoint visibility to effectively reduce breaches.
• The likely evolution of endpoints and how technology is adapting to protect them.
• How to incorporate the evolutions of endpoint detection into security investment decisions.
2. TODAY’S PRESENTERS
ERIC OGREN
Senior Security Analyst, 451 Group
Eric Ogren is a Senior Analyst with the
Information Security team at 451 Research.
Eric has extensive experience in software
development, technology marketing, and as a
security industry analyst.
GAJRAJ SINGH
VP of Product Marketing, Tripwire
Gajraj Singh is an accomplished marketing
and product executive with extensive
experience in various leadership positions
including marketing, product management,
and profit center management.
@EricOgren
Eric.Ogren@451Research.com
@gajrajs
gsingh@tripwire dot com
3. • Evolution of endpoint security
• What you can do today to improve the effectiveness of your
endpoint security program
• How to gain sufficient endpoint visibility to effectively reduce
breaches
• The likely evolution of endpoints and how technology is
adapting to protect them
• How these changes will impact security investment decisions
5. INFORMATION SECURITY
Q3 2015
Source: 451 Research, Voice of the
Enterprise: Information Security, Q3 2015
Q1. Which of the following
types of information security
technologies, if any, does
your organization currently
use?
5
84.5%
70.4%
56.0%
31.4%
3.3%
Endpoint Security
Vulnerability Assessment
Security Information and Event Management (SIEM)
Dynamic and/or Static Application Security Tools (DAST/SAST)
None of the Above
Percent of Sample
n = 910
Usage of Information
Security Technologies
All Respondents
Endpoint security touches us all
6. INFORMATION SECURITY
Q3 2015
Source: 451 Research, Voice of the
Enterprise: Information Security, Q3 2015
Q15. What information
security threat do you think
is inadequately covered
today by your organization
that worries you most going
forward?
6
21.5%
17.9%
11.7%
7.0%
7.0%
6.0%
5.9%
5.9%
4.2%
3.3%
3.1%
6.3%
Hackers/Crackers with Malicious Intent
Preventing/Detecting Insider Espionage
Cyber-warfare
Industry Specific Compliance (e.g. PCI, HIPAA)
Internal Audit Deficiencies Based on Findings
Compliance Requirements (e.g. Due Care)
Service of Performance Degradation Due to Compliance with Security
Policies and Standards
Complying with External Customer/Client Requirements (Due Diligence
Exercises)
Risk of Lawsuit Due to Poor Security Controls
Government Regulatory/Legal Compliance (e.g. GLBA, FISMA)
Complying with External Partner/Supplier Requirements (Due Diligence
Exercises)
Other
Percent of Sample
n = 898
Most Important Security
Concern - Future
All Respondents
This is what we want to be doing…
8. INFORMATION SECURITY
Q3 2015
Source: 451 Research, Voice of the
Enterprise: Information Security, Q3 2015
Q13. Of the top concerns you
selected, which is your
primary concern?
8
21.3%
15.9%
11.3%
10.9%
10.2%
9.4%
5.0%
5.0%
3.6%
2.7%
1.6%
3.2%
Hackers/Crackers with Malicious Intent
Industry Specific Compliance (e.g. PCI, HIPAA)
Government Regulatory/Legal Compliance (e.g. GLBA, FISMA)
Complying with External Customer/Client Requirements (Due Diligence
Exercises)
Compliance Requirements (e.g. Due Care)
Internal Audit Deficiencies Based on Findings
Cyber-warfare
Preventing/Detecting Insider Espionage
Risk of Lawsuit Due to Poor Security Controls
Complying with External Partner/Supplier Requirements (Due Diligence
Exercises)
Service of Performance Degradation Due to Compliance with Security Policies
and Standards
Other
Percent of Sample
n = 894
Most Important Security
Concern - Past 90 Days
All Respondents
...managing compliance posture is important too!
20. • Prevention, correction, compliance
remain focal points
• Behavioral detection/analytics will be
its own sustaining category
• Endpoints will collaborate with
network + cloud
• IT comes to Security for operational
intelligence
What would the new wave of endpoint security look like?
21.
22. ADDITIONAL RESOURCES
www.tripwire.com/register/edr-for-dummies/
Sneak Peek: This is a sneak peek of EDR For
Dummies that includes the first chapter of the book. All
downloaders will be emailed a full copy of the ebook
once it's released on March 8th. You can also pick up a
free copy of the physical book at our booth at RSA
Conference, February 29 through March 4.