ast 0110945 forrester endpoint security trends

13
Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA 02140 USA Tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com Endpoint Security Trends, Q2 2013 To Q4 2014 by Chris Sherman, November 7, 2013 For: Security & Risk Professionals KEY TAKEAWAYS Organizations Spend 9% Of Their IT Budget On Endpoint Security SMBs and enterprises both spend around 9% of their overall IT budget on endpoint security. However, those industries with a higher percentage of mobile workers are more likely to increase spending over the next 12 months. Advanced Controls Are Hot Within SMBs And Enterprises Technologies such as full disk encryption, data loss protection, and host-based intrusion detection are all seeing increased adoption in many organizations. Proactive security controls such as white listing and patch management are also enjoying increased adoption as traditional methods of antivirus protection fail. Enterprises Take The Lead With Adoption Of Endpoint Security Software- As-A-Service Although endpoint security soſtware-as-a-service is traditionally seen as a delivery method preferred by SMBs, enterprises now take a solid lead in its adoption. Security soſtware-as-a-service reduces much of the operational overhead and offers the possibility of completely outsourcing the task of managing the security and operations of user endpoints.

Upload: ilya-osadchiy

Post on 06-Sep-2015

220 views

Category:

Documents


0 download

DESCRIPTION

Forrester Endpoint Security Trends, a research note

TRANSCRIPT

  • Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA 02140 USA

    Tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com

    Endpoint Security Trends, Q2 2013 To Q4 2014by Chris Sherman, November 7, 2013

    For: Security & Risk Professionals

    KEY TAKEAWAYS

    Organizations Spend 9% Of Their IT Budget On Endpoint SecuritySMBs and enterprises both spend around 9% of their overall IT budget on endpoint security. However, those industries with a higher percentage of mobile workers are more likely to increase spending over the next 12 months.

    Advanced Controls Are Hot Within SMBs And EnterprisesTechnologies such as full disk encryption, data loss protection, and host-based intrusion detection are all seeing increased adoption in many organizations. Proactive security controls such as white listing and patch management are also enjoying increased adoption as traditional methods of antivirus protection fail.

    Enterprises Take The Lead With Adoption Of Endpoint Security Software-As-A-ServiceAlthough endpoint security software-as-a-service is traditionally seen as a delivery method preferred by SMBs, enterprises now take a solid lead in its adoption. Security software-as-a-service reduces much of the operational overhead and offers the possibility of completely outsourcing the task of managing the security and operations of user endpoints.

  • 2013, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To purchase reprints of this document, please email [email protected]. For additional information, go to www.forrester.com.

    FOR SECURITY & RISK PROFESSIONALS

    WHY READ THIS REPORT

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the relevant endpoint security data from our most recent surveys, with special attention given to those trends affecting small and medium-size businesses (SMBs) and enterprises, along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2014 budget cycle, security professionals should use this report to help benchmark their organizations spending patterns against their peers while keeping an eye on current trends affecting endpoint security in order to strategize their endpoint security adoption decisions.

    Table Of Contents

    Despite Data Security Concerns, Endpoint Security Spending Is Flat

    Endpoint Security Remains Just One-Tenth Of The Overall Security Budget

    S&R Pros Prefer To Source Endpoint Security From A Single Vendor

    S&R Pros Will Focus Their Investments On Advanced Controls

    Proactive Security Controls Will Continue To Gain Traction Through 2014

    Endpoint Security Software-As-A-Service Adoption Skyrockets

    Enterprises Take The Lead In The Adoption Of Endpoint Security Software-As-A-Service

    WHAT IT MEANS

    Security Pros Must Look For Ways To Spend Smarter, Not More

    Supplemental Material

    Notes & Resources

    Forrester interviewed three enterprises currently making significant endpoint security investments. Each asked to remain anonymous. We also drew from a wealth of analyst insight gathered via client inquiries, briefings, and consulting engagements.

    Related Research Documents

    Market Overview: Endpoint Encryption Technologies, Q1 2013January 16, 2013

    The Forrester Wave: Endpoint Security, Q1 2013January 4, 2013

    Application Control: An Essential Endpoint Security ComponentSeptember 7, 2012

    Endpoint Security Trends, Q2 2013 To Q4 2014New Disruptors For Endpoint Security Through 2014by Chris Shermanwith Stephanie Balaouras and Dominique Thomas

    2

    4

    4

    7

    8

    9

    NOVEMBER 7, 2013

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 2

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    DESPITE DATA SECURITY CONCERNS, ENDPOINT SECURITY SPENDING IS FLAT

    Todays cybercriminals often target employee endpoints, such as desktops, laptops, tablets, and mobile devices, and use them as a way into the corporate infrastructure. They use social engineering, spear phishing, and other means to trick unsuspecting employees into downloading seemingly innocuous files that contain malware or redirect them to malicious websites, ultimately giving the attacker access to some of your organizations most sensitive data. According to our Forrsights Devices And Security Workforce Survey, Q2 2012, 51% of employees have access to sensitive customer data and 23% have access to nonpublic financial information whether they need that access or not (see Figure 1).

    Year after year, protecting data is a top priority for security decision-makers and influencers.1 Employee endpoints are frequent targets of cybercriminals, and gaining control of the endpoint provides easy access to some of the organizations most sensitive data assets. Forrester believes that any comprehensive data security strategy must include both reducing the endpoint threat surface and limiting exposure to data loss involving these endpoints.

    Figure 1 Employees (And Their Endpoints) Have Access To A Multitude Of Data Types

    Source: Forrester Research, Inc.103581

    What types of information do you have access to at work, regardless of whether youneed to use it for your job or not?

    Base: 4,262 North American and European IT security decision-makers

    Source: Forrsights Devices And Security Workforce Survey, Q2 2012

    Customer data (e.g., names, contactinformation, credit card data) 51%

    Contracts, invoices, customer orders 41%

    Customer service data, account numbers 40%

    Intellectual property belonging to the company(blueprints, designs, formulas, recipes) 30%

    Employee data (e.g., HR data, payroll data) 27%

    Nonpublic corporate nancialinformation relating to the company 23%

    None of the above 20%

    Nonpublic corp marketing/strategyplans relating to the company 19%

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 3

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    Endpoint Security Remains Just One-Tenth Of The Overall Security Budget

    The latest Forrsights security survey found that budget for endpoint security has remained flat from 2010 to 2013 approximately 9% to 11% of the total IT security budget (see Figure 2). The same survey found that certain industries, such as the public sector, healthcare, retail, and wholesale, are less likely to increase endpoint security spending in 2014, compared with business services, utilities, and media/entertainment/leisure industries.2 While the former include some highly regulated industries, the latter have a higher percentage of mobile workers. According to our survey, 41% of workers in business services and 28% of workers in utilities work while traveling at least a few times per month.3 The more mobile the workforce, the more important it is for S&R pros to protect sensitive data from theft or loss or when employees connect to public Wi-Fi networks and other access points.

    Figure 2 Endpoint Security Spending Remains Stable Year-Over-Year

    Source: Forrester Research, Inc.103581

    What percentage of your rms IT security budget will go to the following technology areas?(Client threat management)

    Base: 663 SMB and 549 enterprise NA/EMEA IT security decision-makers*Base: 606 SMB and 746 enterprise NA/EMEA IT security decision-makersBase: 728 SMB and 669 enterprise NA/EMEA IT security decision-makersBase: 682 SMB and 735 enterprise NA/EMEA IT security decision-makers

    Year surveyed

    Source: Forrsights Security Survey, Q3 2010*Source: Forrsights Security Survey, Q2 2011Source: Forrsights Security Survey, Q2 2012Source: Forrsights Security Survey, Q2 2013

    2010 2011* 2012 2013

    Enterprise SMB

    9%

    11%10%

    11%10% 10%

    9%10%

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 4

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    S&R PROS PREFER TO SOURCE ENDPOINT SECURITY FROM A SINGLE VENDOR

    While overall endpoint security spending has remained relatively consistent, many S&R pros have stretched their budget by investing in security products that integrate multiple technologies (organized into product suites offered by a single vendor). In fact, 60% of enterprises and 61% of SMBs prefer to source their endpoint security technologies through a single vendor (see Figure 3).

    Investing in product suites allows S&R pros to take advantage of suite discounting while acquiring a broader set of security technologies.4 Ancillary benefits include less time spent training security staff on multiple interfaces while giving security pros integrated management and reporting for a better overall security posture. Forrester often speaks with client organizations in the midst of vendor selection projects that ultimately choose product suites over point products for these very reasons.

    Figure 3 S&R Orgs Prefer Single-Vendor Suites Over Multiple Point Products For Endpoint Security

    S&R PROS WILL FOCUS THEIR INVESTMENTS ON ADVANCED CONTROLS

    Although antivirus (AV) has become nearly ubiquitous, it is no longer sufficient.5 To protect against evolving threats, S&R pros are adopting controls that are more advanced (see Figure 4 and see Figure 5). While some technologies, such as host firewall and patch management, have found widespread deployment in enterprises and SMBs, others are less adopted but increasing in popularity due to a number of business technology trends.6 Specifically, Forrester sees that:

    Endpoint DLP continues to gain footing as mobility increases. S&R pros concerned with internal threats turn to DLP to protect their data. However, as corporate data increasingly resides on endpoints outside the network, technologies such as endpoint DLP, which can ensure that protection travels with the data, become more appealing.

    Source: Forrester Research, Inc.103581

    Endpoint (desktop/laptop) security: How does your rm prefer to source eachof the following types of security technologies or managed/SaaS services?

    Base: 1,863 North American and European IT security decision-makers

    Source: Forrsights Security Survey, Q2 2013

    Single vendor portfolio/ecosystem(prefer only one vendor)

    38%33%

    Best-of-breed solution(prefer multiple vendors)

    60%61% SMB

    Enterprise

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 5

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    Host intrusion prevention system (HIPS) picks up where network security leaves off. As the mobility trend increases, continuous protection from network-based security technologies is not always feasible. HIPS moves past traditional AV signature-based detection and uses more-advanced systems analyses to detect and stop attacks as they occur, wherever they may occur.7

    Full disk encryption protects against device loss and compliance failures. To protect data and achieve compliance, S&R pros are increasingly turning to full disk encryption. Full disk encryption is by far the easiest to implement and presents little impact on the user experience when compared with file-level encryption.8 Therefore, full disk encryption is often a popular choice among organizations with tough data protection requirements.

    Self-encrypting drives offer superior security and performance over software-based solutions. Compared with software-based full disk encryption solutions, self-encrypting drives enjoy higher adoption in the enterprise due to their superior security stance and lower impact on endpoint performance.9

    File-level encryption is especially popular in shared environments. For those files residing on the endpoint requiring an extra layer of security, file-level encryption offers a reliable way to prevent unauthorized users from accessing this information. This is especially critical in hospitals, retail locations, and schools or universities where endpoints can have multiple users.

    Figure 4 Enterprise 2014 Projected Spending Versus Current Deployed Base

    Source: Forrester Research, Inc.103581

    Base: 379 client security decision-makers at enterprises with 1,000 or more employees

    Already implemented

    Plan

    ning

    to im

    plem

    ent

    in th

    e ne

    xt 1

    2 m

    onth

    s

    Source: Forrsights Security Survey, Q2 2013

    HIPS

    What are your rms plans to adopt the following client security (desktop/laptop) and data security technologies?

    50% 55% 60% 65% 70% 75% 80% 85% 90%

    7%

    9%

    11%

    13%

    15%

    17%

    19%

    DesktopDLP

    File-levelencryption

    Device/portcontrol

    Personal rewall

    URLltering

    Applicationwhite listing

    Device kill

    Full disk encryption(software-based)

    Full disk encryption(self-encrypting drive)

    Patch management

    Antivirus

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 6

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    Figure 5 SMB 2014 Projected Spending Versus Current Deployed Base

    Proactive Security Controls Will Continue To Gain Traction Through 2014

    Traditionally, S&R pros have relied on signature-based antimalware as the focal point to their endpoint protection strategy, but third-party research has shown this approach is far from perfect when protecting against zero-day malware.10 Proactive security tools, such as application white listing and patch management technologies, help reduce the threat surface of the endpoint environment to a more manageable level without relying on signatures.

    Proactive controls certainly come with some management overhead, but they can offer superior protection when compared with blacklist-based techniques.11 Case in point: A large media company with extensive software R&D demands recently told Forrester: Antimalware (signature-based) is a dead technology. We plan to phase this out in favor of application white listing and vulnerability management techniques over the next year.

    Data shows that organizations see the value in such techniques at preventing malware from taking hold on the endpoint. Although 23% of enterprises and 21% of SMBs plan to implement application

    Source: Forrester Research, Inc.103581

    Base: 313 client security decision-makers at SMBs with 20 to 999 employees

    Already implemented

    Plan

    ning

    to im

    plem

    ent

    in th

    e ne

    xt 1

    2 m

    onth

    s

    Source: Forrsights Security Survey, Q2 2013

    What are your rms plans to adopt the following client security (desktop/laptop) and data security technologies?

    30% 40% 50% 60% 70% 80% 90%0%

    2%

    4%

    6%

    8%

    10%

    12%

    14%

    16% Applicationwhite listing

    Full disk encryption(self-encrypting drive)

    Full disk encryption(software-based)

    File-level encryption

    URL lteringPatch management

    Personal rewall Antivirus

    Device/port control

    DLP

    Device kill

    HIPS

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 7

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    white listing in the next 12 months and beyond, only 11% of both enterprises and SMBs plan to adopt antimalware. Patch management technologies are almost equally hot today, with 17% of SMBs and 20% of enterprises planning to adopt in the next 12 months and beyond.

    ENDPOINT SECURITY SOFTWARE-AS-A-SERVICE ADOPTION SKYROCKETS

    Forrester defines endpoint security software-as-a-service (SaaS) as endpoint security services or functions hosted by a third party, billed on a pay-per-use model, and delivered via a multitenant architecture. Drivers for SaaS delivery of endpoint security technologies include scalability, lower operational overhead, and the need for a thinner client footprint. Security technologies such as host firewalls and AV software are prime candidates for security SaaS delivery given their popularity and dependence on external update services. Going forward, security pros can expect endpoint security SaaS suites with more comprehensive functionality, including file reputation feeds, application control and management, and patch management.

    Enterprises Take The Lead In The Adoption Of Endpoint Security Software-As-A-Service

    According to our Forrsights Security Survey, Q2 2013, 46% of all organizations either have deployed or are planning to upgrade their existing endpoint security SaaS implementation (see Figure 6). Another 10% of organizations plan to adopt endpoint security SaaS for the first time in 2014. We see some interesting trends when we compare SMBs versus enterprise adoption:

    SMBs have a healthy adoption of endpoint security SaaS . . . In the past, SMBs have led the way when it comes to cloud service adoption. Endpoint security SaaS delivery takes away much of the operational overhead and offers the welcome possibility of completely outsourcing the cumbersome task of managing the security and operations of user endpoints. For smaller organizations with limited staff and expertise in managing complex security tools, its often thought that SMBs are poised to benefit the greatest from the practice of outsourcing these tasks to cloud service providers.

    . . . but enterprises are far outpacing their adoption. However, Forrester now sees enterprise adoption of endpoint security SaaS (51%) surpassing that of SMBs (41%). Furthermore, 17% of enterprises plan to upgrade their current endpoint security SaaS implementations compared with 9% within SMBs. Both enterprises and SMBs appreciate the benefits brought on by the cloud delivery of these services, but enterprises security teams often have additional responsibilities beyond traditional IT security, and they must deal with more threats and frequent attacks, so adopting endpoint security SaaS is a good way to free up internal resources to focus on more critical tasks.

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 8

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    Figure 6 Endpoint Security Software-As-A-Service Heats Up Within Enterprises And SMBs

    W H AT I T M E A N S

    SECURITY PROS MUST LOOK FOR WAYS TO SPEND SMARTER, NOT MORE

    With the explosion of endpoint form factors as a visible attack vector to your network, S&R pros at organizations, regardless of size, must take a renewed interest in endpoint security. Considering that your budget for endpoint security will likely remain the same during the next 12 months, S&R pros must look for ways to maximize their current and planned investments. This means:

    Invest in proactive security controls rather than (more) reactive technologies. Threat protection is a critical component to any organizations endpoint security strategy. Rather than adopting new or expanding currently implemented signature-based measures (think antivirus and antimalware), consider more proactive techniques such as application white listing combined with targeted patch management.

    Source: Forrester Research, Inc.103581

    Source: Forrsights Security Survey, Q3 2009*Source: Forrsights Security Survey, Q3 2010Source: Forrsights Security Survey, Q2 2011Source: Forrsights Security Survey, Q2 2012Source: Forrsights Security Survey, Q2 2013

    Base: 950 SMB and 1,009 enterprise NA/EMEA IT security decision-makers*Base: 1,009 SMB and 1,049 enterprise NA/EMEA IT security decision-makers

    Base: 856 SMB and 1,267 enterprise NA/EMEA IT security decision-makersBase: 1,030 SMB and 1,124 enterprise NA/EMEA IT security decision-makers

    Base: 313 SMB and 379 enterprise NA/EMEA IT security decision-makers

    Year surveyed

    0%

    12%

    24%

    36%

    48%

    60%

    What are your rms plans to adopt the following as-a-service security oerings/approaches?(Endpoint security)

    2009 2010* 2011 2012 2013

    Already implemented and/or expanding

    Enterprise

    SMB

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 9

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    Choose an endpoint encryption solution based on user experience and flexibility. Avoid point products that dont provide good integration with enterprise identity management and endpoint management in general. Consider native OS options when appropriate. For an endpoint encryption implementation to be successful, it must be secure by default and provide a transparent user experience.

    Keep an eye toward future endpoint security delivery methods. As endpoints become increasingly mobile and the infrastructure needed to protect them more complex, endpoint security SaaS will become more attractive to SMBs and enterprises alike. Move more of your core endpoint security controls into the cloud as opportunity and technology maturity allow.

    SUPPLEMENTAL MATERIAL

    Methodology

    Forresters Forrsights Security Survey, Q2 2013, was fielded to 2,134 IT executives and technology decision-makers located in Canada, France, Germany, the UK, and the US from SMB and enterprise companies with two or more employees. This survey is part of Forresters Forrsights for Business Technology and was fielded from March 2013 to June 2013. ResearchNow fielded this survey online on behalf of Forrester. Survey respondent incentives include points redeemable for gift certificates. We have provided exact sample sizes in this report on a question-by-question basis.

    Each calendar year, Forresters Forrsights for Business Technology fields business-to-business technology studies in more than 17 countries spanning North America, Latin America, Europe, and developed and emerging Asia. For quality control, we carefully screen respondents according to job title and function. Forresters Forrsights for Business Technology ensures that the final survey population contains only those with significant involvement in the planning, funding, and purchasing of IT products and services. Additionally, we set quotas for company size (number of employees) and industry as a means of controlling the data distribution and establishing alignment with IT spend calculated by Forrester analysts. Forrsights uses only superior data sources and advanced data-cleaning techniques to ensure the highest data quality.

    Companies Interviewed For This Report

    Three end user organizations that asked to remain anonymous.

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 10

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    ENDNOTES1 For more information on what constitutes sensitive data and the value in protecting such data, see the April

    5, 2013, Strategy Deep Dive: Define Your Data report.

    2 According to Forrsights Security Survey, Q2 2013, certain industries anticipate higher endpoint security spending in the following year (2014) based on responses to our question, How do you expect your firms security spending in the following technology areas will change from 2013 to 2014? Results show that 39% of organizations in the media, entertainment, and leisure industries, 31% of those in utilities and communications, and 28% of those in business services plan to spend 5% or more on client threat management in 2014. This contrasts with 19% in the public sector/healthcare and 23% in retail and wholesale. Source: Forrsights Security Survey, Q2 2013.

    3 According to the Forrsights Workforce Employee Survey, Q2 2012, there are significant industry differences in the percentage of employees who report working outside of the office in a given month. For instance, 41% of those in business services and 28% in utilities work while traveling at least a few times per month. This contrasts with 25% in retail and 23% in the healthcare industries. These same highly mobile industries also anticipate higher endpoint security spending in 2014, according to the Forrsights Security Survey, Q2 2013.

    4 For more information on the benefits of investing in an endpoint security product suite, as well as an evaluation of existing solutions, see the January 4, 2013, The Forrester Wave: Endpoint Security, Q1 2013 report.

    5 Antivirus is software that is used to prevent, detect, and remove malware from the endpoint. Malware can be any form of computer virus, spyware, worm, Trojan horse, or any executable that causes harm to the endpoint or connected network.

    AV-Test and AV-Comparatives.org both report low detection rates (between 65% and 98%, depending on tools used) when using antimalware engines to detect previously unknown malware resident on Windows machines. Visit the following for more information. Source: Microsoft: Security Essentials, AV-Test, May-June 2013 (http://www.av-test.org/no_cache/en/tests/test-reports/?tx_avtestreports_pi1%5Breport_no%5D=132335) and Retrospective/Proactive test, AV-Comparatives.org, August 2013 (http://www.av-comparatives.org/wp-content/uploads/2013/08/avc_beh_201303_en.pdf).

    6 Host firewall is software installed on the endpoint that is designed to permit or deny network transmissions based on a set of rules defined by the system administrator, the intended outcome being to let good traffic pass while blocking malicious traffic.

    Patch management is a centrally managed software agent that continually checks for the existence of the latest patches for all software installed on the endpoint. When critical patches are released, the agent verifies that these are installed in a timely fashion

    7 HIPS is a centrally managed software tool installed on the endpoint that uses various methods to detect, prevent, and log malicious activity. Methods used might include code analysis, network traffic analysis, file system analysis, log analysis, and network configuration monitoring.

  • FOR SECURITY & RISK PROFESSIONALS

    Endpoint Security Trends, Q2 2013 To Q4 2014 11

    2013, Forrester Research, Inc. Reproduction Prohibited November 7, 2013

    8 For more information on the pros and cons of different types of full disk encryption technologies, see the January 16, 2013, Market Overview: Endpoint Encryption Technologies, Q1 2013 report.

    9 Self-encrypting hard drives, such as Opal-compliant self-encrypting drives (SEDs) and Windows 8 Encrypted Hard Drive, leverage hardware capabilities built into the disk drive itself to perform encryption and decryption. In each case, the disk drive itself performs crypto instructions. This frees the CPU for other parallel tasks without impacting endpoint performance. Self-encrypting drives operate independently of the operating system, which means even an OS compromise may not necessarily lead to the compromise of encrypted data. In comparison, software-based solutions often leverage the endpoints CPU for encryption/decryption functions, which may negatively impact overall performance.

    10 AV-Test and AV-Comparatives.org both report low detection rates (between 65% and 98%, depending on tools used) when using antimalware engines to detect previously unknown malware resident on Windows machines. Visit the following for more information. Source: Microsoft: Security Essentials, AV-Test, May-June 2013 (http://www.av-test.org/no_cache/en/tests/test-reports/?tx_avtestreports_pi1%5Breport_no%5D=132335) and Retrospective/Proactive test, AV-Comparatives.org, August 2013 (http://www.av-comparatives.org/wp-content/uploads/2013/08/avc_beh_201303_en.pdf).

    11 For more information on the pros and cons of leveraging proactive security technologies such as application control and patch management when combating malware on the endpoint, see the September 7, 2012,

    Application Control: An Essential Endpoint Security Component report.

  • Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology. Forrester works with professionals in 13 key roles at major companies providing proprietary research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 29 years, Forrester has been making IT, marketing, and technology industry leaders successful every day. For more information, visit www.forrester.com. 103581

    Forrester Focuses On Security & Risk Professionals To help your firm capitalize on new business opportunities safely,

    you must ensure proper governance oversight to manage risk while

    optimizing security processes and technologies for future flexibility.

    Forresters subject-matter expertise and deep understanding of your

    role will help you create forward-thinking strategies; weigh opportunity

    against risk; justify decisions; and optimize your individual, team, and

    corporate performance.

    SEAN RHODES, client persona representing Security & Risk Professionals

    About ForresterA global research and advisory firm, Forrester inspires leaders,

    informs better decisions, and helps the worlds top companies turn

    the complexity of change into business advantage. Our research-

    based insight and objective advice enable IT professionals to

    lead more successfully within IT and extend their impact beyond

    the traditional IT organization. Tailored to your individual role, our

    resources allow you to focus on important business issues

    margin, speed, growth first, technology second.

    FOR MORE INFORMATION

    To find out how Forrester Research can help you be successful every day, please contact the office nearest you, or visit us at www.forrester.com. For a complete list of worldwide locations, visit www.forrester.com/about.

    CLIENT SUPPORT

    For information on hard-copy or electronic reprints, please contact Client Support at +1 866.367.7378, +1 617.613.5730, or [email protected]. We offer quantity discounts and special pricing for academic and nonprofit institutions.