New Absolute Research Reveals That Endpoint Security Tools Fail, Reliably and Predictably

Ad blocking detected

Thank you for visiting CanadianInsider.com. We have detected you cannot see ads being served on our site due to blocking. Unfortunately, due to the high cost of data, we cannot serve the requested page without the accompanied ads.

If you have installed ad-blocking software, please disable it (sometimes a complete uninstall is necessary). Private browsing Firefox users should be able to disable tracking protection while visiting our website. Visit Mozilla support for more information. If you do not believe you have any ad-blocking software on your browser, you may want to try another browser, computer or internet service provider. Alternatively, you may consider the following if you want an ad-free experience.

Canadian Insider Club
$299/ year*
Daily Morning INK newsletter
+3 months archive
Canadian Market INK weekly newsletter
+3 months archive
30 publication downloads per month from the PDF store
Top 20 Gold, Top 30 Energy, Top 40 Stock downloads from the PDF store
All benefits of basic registration
No 3rd party display ads
JOIN THE CLUB

* Price is subject to applicable taxes.

Paid subscriptions and memberships are auto-renewing unless cancelled (easily done via the Account Settings Membership Status page after logging in). Once cancelled, a subscription or membership will terminate at the end of the current term.

Apr 17, 2019 01:34 pm
VANCOUVER, British Columbia -- 

Absolute (TSX: ABT), the leader in endpoint resilience, today revealed that endpoint security tools and agents fail, reliably and predictably, based on findings from its new 2019 Global Endpoint Security Trends Report. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in turn, exposing the dangers of equating IT security spending with security and risk maturity. The study analyzed data from six million devices and one billion change events over the course of a year.

The endpoint has quickly become valuable real estate for security tools and controls, as traditional network perimeters have given way to cloud-based models in support of the digital workforce. Global security spending is forecast to reach $128 billion by 2020 with endpoint security spend comprising 24 percent of that total(1), and yet, over 70 percent of breaches originate on the endpoint.

The complexity of endpoint device controls creates a false sense of security among organizations while, in reality, causing security gaps and significant risks due to regular and reliable tool failure. Staggering findings on endpoint security degradation include:

  • 42 percent of all endpoints are unprotected at any given time
  • Two percent of endpoint agents fail per week, meaning 100 percent of endpoint security tools eventually fail – no tool is immune
  • 28 percent of all endpoints are unprotected by anti-malware with 21 percent of these endpoints unprotected due to outdated or broken agents and 7 percent due to missing agents
  • 100 percent of devices will have failed encryption controls at least once within one year
  • Almost 1 in 5 devices become unreachable due to client management tool failures
  • Client patch management agents fail around 50 percent more often than encryption agents

As cybercrime threatens to cost the world $6 billion annually in damages by 2021, organizations need to address these issues. IT and security teams must be able to better understand what is happening on their devices and respond to suspicious events to reduce security failures. Organizations should analyze the tools already in use to identify blind spots or opportunities to strengthen their defenses before adding more security controls.

“Evolving security threats have caused enterprises to layer on more and more endpoint controls, increasing complexity, impacting performance, and in some cases the collision of these controls is leaving the endpoint exposed,” said Christy Wyatt, chief executive officer at Absolute. “This complexity of the landscape is making it increasingly difficult for IT and security to have visibility and control. Our research shows the vulnerability that is introduced when critical security controls collide or decay over time. In other words, increased security spending does not increase safety.”

The “2019 Endpoint Security Trends” report analyzes data compiled over the course of a year by Absolute’s security research team. The devices represent data from 12,000 anonymized organizations across North America and Europe, and a third-party research organization was commissioned to conduct in-depth, exploratory interviews with senior executives from Fortune 500 companies to offer context to the findings.

For additional details or to review the findings, download the complete report.

About Absolute

Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications, and users against theft or attack—both on and off the corporate network. With the industry’s only tamper-proof endpoint visibility and control solution, Absolute allows IT organizations to enforce asset management, security hygiene, and data compliance for today’s remote digital workforces. Absolute’s patented Persistence® technology is embedded in the firmware of Dell, HP, Lenovo, and 22 other leading manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of deployment. See how it works at www.absolute.com and follow us on Twitter at @absolutecorp.

©2019 Absolute Software Corporation. All rights reserved. ABSOLUTE and PERSISTENCE are registered trademarks of Absolute Software Corporation. Other names or logos mentioned herein may be the trademarks of their respective owners. For patent information, visit www.absolute.com/patents. The Toronto Stock Exchange has neither approved nor disapproved of the information contained in this press release.

(1) Source: Morgan Stanley 2016. Cybersecurity: Rethinking Security

Media and Analyst Relations
Jill Rosenthal, InkHouse
absolute@inkhouse.com or 781-966-4167

Investor Relations
Joo-Hun Kim, MKR Group
joohunkim@mkrir.com or 212-868-6760

Comment On!

140
Upload limit is up to 1mb only
To post messages to your Socail Media account, you must first give authorization from the websites. Select the platform you wish to connect your account to CanadianInsider.com (via Easy Blurb).