• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Endpoint Security Processes And Visibility Remain Challenges: SANS

by CXO Staff
December 4, 2019
in News

According to SANS Institute, 39% of respondents have concerns about employee-owned mobile devices and lack processes to cover them in corporate policy.

mobile phone endpoint
Justin Henderson, SANS Institute
Justin Henderson, SANS Institute

Centralised logging and automation solutions are now a necessity to detect, defend against and respond to modern attacks, according to the SANS 2019 Endpoint Protection and Response Survey released by SANS Institute. These solutions include data analytics tools – such as security information and event management (SIEM) and endpoint detection and response (EDR) – as well as anomaly detection technologies like user behaviour monitoring and machine learning.

“Attacks often start on employee workstations, then pivot to critical data sources on servers,” said SANS Instructor and survey Co-Author Justin Henderson. “That makes endpoints ground zero for protecting an organisation’s assets. But defending them from attacks isn’t easy.”

In fact, 39% of survey respondents have concerns about employee-owned mobile devices and lack processes to cover them in corporate policy. Employer-owned devices fare better, with only 25% being concerned about such endpoints and unable to cover them in organisational security plans. This lack of control may be related to the fact that fewer than 27% of employee-owned laptops and mobile devices are centrally managed.

“Due to the never-ending nature of cyberattacks, it is vital that organisations collect the data that will enable them to quickly identify the attack, mitigate any damage and remediate the issues,” according to survey Co-Author and SANS Instructor John Hubbard. “However, due to the complex nature of logging and multitude of data sources, many organisations struggle to gather the proper data they need to conduct efficient incident response and remediation activities.”

John Hubbard, SANS Institute
John Hubbard, SANS Institute

While 11% of respondents report an inability to identify what data has been breached, and 66% find it difficult, the SANS survey indicates that a combination of file access auditing, DLP and EDR solutions might help organisations that struggle with these activities. The 2019 survey also shows that the use of next-generation endpoint controls is increasing within organisations. Anomaly detection increased by 10% and machine learning solutions increased by 12%. Even tools such as automation tools and vulnerability scanners increased in implementation by 5% year-over-year.

Other statistics identified in the report included:

  • 62% of breaches can be identified within the first 24 hours
  • 28% of survey respondents confirmed that attackers had accessed endpoints
  • Phishing was the top attack vector (cited by 57.8% of respondents), followed by browser-based drive-by download attacks (51.8%) and then credential theft or compromise (48.2%).

The report is sponsored by Cisco Systems, OpenText Inc., Sophos Inc., and VMware Carbon Black.

Tags: EDRendpointsfeaturedJohn HubbardJustin HendersonSANSSIEMsurvey
ShareTweet

Related Posts

e& UAE pioneers world’s first high-density XGS-PON technology
Future

e& UAE pioneers world’s first high-density XGS-PON technology

e& UAE announced the successful deployment of the world’s first 32-port high-density XGS-PON (10 Gigabit Symmetrical Passive Optical Network) solution,...

June 9, 2025
NVIDIA DLSS 4 powers Dune
Future

NVIDIA DLSS 4 powers Dune

NVIDIA DLSS 4 with Multi Frame Generation is multiplying performance in Dune: Awakening. Additionally, EA SPORTS F1 25 is now...

June 9, 2025

Discussion about this post

Latest Issue

e& UAE pioneers world’s first high-density XGS-PON technology

e& UAE pioneers world’s first high-density XGS-PON technology

June 9, 2025
NVIDIA DLSS 4 powers Dune

NVIDIA DLSS 4 powers Dune

June 9, 2025
Fortinet unveils new AI-powered workspace security suite

Fortinet unveils new AI-powered workspace security suite

June 9, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.