New Ponemon Study Finds Traditional Endpoint Security Approaches Are Ineffective, Costing the Average Enterprise $6 Million+ Per Year
With the cost and complexity of endpoint security at an all-time high, Ponemon’s research reveals 63 percent of enterprises cannot monitor at-risk, dark endpoints, leaving more than 50 percent of endpoints vulnerable to a costly data breach
VANCOUVER, Canada: June 13, 2017 — Absolute, the self-healing endpoint security company, announced today the results of “Cost of Insecure Endpoints Benchmark Study,” an independent benchmarking study conducted by the Ponemon Institute. The research reveals that traditional endpoint security approaches are ineffective and are costing enterprises more than $6 million per year in poor detection, slow response and wasted time. As the aggressive nature of emerging threats to proprietary data continues to grow, the cost and complexity of reducing risks and confirming compliance are at an all-time high.
The Ponemon study revealed organizations are finding it increasingly difficult to identify dark endpoints — the rogue, out-of-compliance, or off-network devices that create blind spots and increase an organization’s vulnerability to attack. While confidence in endpoint security ranked low, the IT security professionals surveyed believe that close to 60 percent of the hours currently invested in the capture and evaluation of intelligence surrounding the true threats, to both compliance and proprietary data, can be saved each week by deploying automated solutions.
“At the Ponemon Institute, we’ve followed the endpoint security industry closely for more than a decade. It’s clear that enterprises face real visibility and control challenges when it comes to protecting the data on corporate endpoints, ensuring compliance and keeping up with threats,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “Enterprises need an automated approach to give IT pros visibility into endpoint security health and to better understand risk exposure, ensure compliance and improve visibility.”
The study takes into account research into the security practices and budgets of more than 550 IT and IT security practitioners. While the results were staggering, the research did not take into account the liability associated with increased risks of data breaches that are becoming all too commonplace as workers place data at risk on laptops, mobile phones and tablets. Key findings from the study include the following:
- Blind spots are large and growing: Among respondents, 63 percent could not monitor endpoint devices when they left the corporate network, while 53 percent of companies reveal that malware-infected endpoints have increased in the past 12 months.
- Out-of-date, unpatched or corrupted endpoint agents are the most common endpoint security gaps: 55 percent of respondents say endpoint management and security applications have been removed or corrupted.
- Compliance and data protection are at risk: Some 56 percent of companies lack a cohesive compliance strategy, and 70 percent report a “below average” ability to minimize endpoint failure damages. Only 28 percent of respondents say their organizations rely on automated analysis and inspection to determine compliance.
- Respondents believe automation increases efficiency and offers better visibility of dark endpoints: It costs organizations an average of $1.37 million annually in wasted time responding to erroneous malware alerts. Enterprises could save nearly $2.1 million annually with automated endpoint security solutions.
“Managing endpoint security and protecting proprietary data is more than an IT issue, it’s increasingly a global business performance and national security concern,” said Geoff Haydon, CEO, Absolute. “This study along with recent ransomware attacks and high-profile data breaches show the danger of today’s endpoint blind spots, and underscore that automation and newer approaches to endpoint security are key to safeguarding endpoints and the sensitive data on them for optimal business performance.”
For a complete copy of the “Cost of Insecure Endpoints Benchmark Study,” visit www.absolute.com/ponemon.
Absolute is the new standard for endpoint visibility and control, delivering always-connected IT asset management and self-healing endpoint security to protect devices, data, applications and users — on and off the network. Bridging the gap between IT operations and security, only Absolute gives enterprises visibility they can act on to assess every endpoint, remediate vulnerabilities and at-risk data, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of more than one billion PC and mobile devices and trusted by over 20,000 customers worldwide.
©2017 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this news release.
For more information, please contact:
Media and Analyst Relations
Darah Patton, InkHouse
email@example.com or 1 317 695 5630
Joo-Hun Kim, MKR Group
firstname.lastname@example.org or 1 212 868 6760