SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Insights on Endpoint Security
and Stealthy Threats

               Intel’s IT Manager Survey
IT Managers Speak Out
400 IT Professionals: 200 U.S., 200 U.K.




        Benchmarking data for your own IT initiatives:

        •	 Key security concerns for endpoint devices and mobile workers
        •	 Perspective on consumerization and Bring Your Own Device (BYOD)
        •	 Impact and high costs of rootkit attacks in the enterprise environment
        •	 Top trusted security vendors for protecting against viruses and malware




2    INTEL IT CENTER | Peer Research
Top Five Findings

        1|             Securing endpoint devices, cloud computing,
                       and consumerization are top concerns


        2|             Data protection is the leading concern
                       for mobile workers


        3|             There is greater support for consumerization
                       in the United States


        4|             One in four IT managers in the United States has experienced
                       a rootkit attack—10 percent higher than reported by U.K. respondents


        5|             Rootkits bring tough consequences—including
                       a one-week detection time


3   INTEL IT CENTER | Peer Research
Securing Endpoint Devices

                                                                       Level of Security Concern
                                                                            % Very/Extremely Concerned
    Companies are supporting
    between 3K and 4K
                                                                                                                          62%
    endpoint devices                          Cloud computing
                                                                                               37%

                                                                                                                          61%
                                        Consumerization/BYOD
                                                                                                             51%

    Top concerns are endpoint                                                                                             60%
                                             Endpoint devices
    device security, cloud,	                                                                    39%

    and consumerization                      Lack of IT control
                                                                                                                    56%
                                                                                                      42%

                                                                                                                  52%
                                                 Virtualization
                                                                                         30%
    Consumerization is the
    leading concern for IT                  Lack of IT visibility
                                                                                                            48%
                                                                                               36%
    managers in the U.K.

                                                                    U.S. (n=200)
                                                                    U.K. (n=200)




4     INTEL IT CENTER | Peer Research
Security Concerns for Mobile Workers

    Four in five companies                                       Specific Remote Security Concerns
                                                                    Among Those Supporting Remote Employees
    are supporting mobile
    and remote workers
                                                                                                                                79%
                                             Data protection
                                                                                                                          69%


    Half of all respondents             Consequences of lost                                                        62%
                                            or stolen devices                                                      61%
    are concerned about the
    ability to maintain adequate           Malware infection
                                                                                               47%
                                                                                                               59%


    levels of mobile security
                                          Compliance breach                                                  55%
                                                 or violation                                    49%

                                                                                                48%
                                           Loss of IT control
    Data protection is the                                                                             52%

    leading concern for
    both countries                                              U.S. (n=164)
                                                                U.K. (n=170)




5     INTEL IT CENTER | Peer Research
Consumerization: Friend or Foe?

    80 percent of IT managers                                                         BYOD Perception
    in the United States
    support BYOD in                                    Creates a security risk
                                                                                                                                          64%
                                                                                                                                    58%
    the enterprise
                                                                                                                                    56%
                                        Allows employees to connect remotely
                                                                                                                  42%


    32 percent of IT managers in                  Improves employee morale
                                                                                                            38%
                                                                                                                              50%


    the U.K. feel it shouldn’t be
                                                                                                                  40%
    allowed in the enterprise                         Lowers equipment cost
                                                                                                                    44%

                                                                                                                        46%
                                                         Boosts productivity
                                                                                                            36%

    Leading perceptions are                                                                     20%
                                                       Should not be allowed
    both positive and negative                                                                        32%

    (remote connectivity,
    security risks)                                                              U.S. (n=200)
                                                                                 U.K. (n=200)




6     INTEL IT CENTER | Peer Research
Experience with Stealthy Threats

    One in four U.S.                                                      Changes Due to Rootkit Attack
                                                                            Among Those Experiencing Rootkit Attack
    IT managers has
    experienced a rootkit
    attack—10 percent higher                     Ensure antivirus is updated
                                                                                                                               68%
                                                                                                                              67%
    than reported by U.K.
                                                                                                                               68%
                                                          Password changes
                                                                                                                              64%

                                                                                                                        60%
    Time to detection was                Add additional security technologies
                                                                                                                              67%
    approximately one week—                                                                                            58%
    spreading malware,                     Enforce stricter Web usage policy
                                                                                                                              64%

    impacting productivity                                                                                            57%
                                        End-user security awareness training
                                                                                                                              67%




    Led to changes                                                              U.S. (n=60)
    to IT security                                                              U.K. (n=39)




7     INTEL IT CENTER | Peer Research
Rootkit Attacks Costly, Complex

    Total cost of recovery
    estimated at $10K
                                                                                      Rootkit Attack
    (U.S.) and often required           Significant Differences
                                        by Rootkit Attack Experience                  Yes       No
    reinstalling or reimaging                                                        n=99     n=301
    the operating system
                                        Median endpoint security products deployed    4.0        2.7


    Approximately one-quarter           Support multiple OS platforms                75%        51%
    of employees experienced an
    impact to productivity              Concerned about mobile/remote security       63%        44%


                                        Current products sufficient in
                                                                                     58%        41%
    Key differences noted based         protecting against rootkits
    on attack experience




8     INTEL IT CENTER | Peer Research
Top Security Vendors

                     For rootkit prevention, Symantec, McAfee,
         1
                     and Microsoft ranked almost equally



                     IT managers with rootkit attack experience more
         2
                     likely to use multiple security vendors



                     McAfee reported as the most commonly deployed
         3
                     endpoint security vendor




9   INTEL IT CENTER | Peer Research
Learn More


                                       •	 Read the full research report,
                                          Insights on Endpoint Security
                                          and Stealthy Threats
                                       •	 Find out more about Intel® and
                                          McAfee® security solutions designed
                                          to prevent stealthy threats beyond
                                          the operating system:

                                          intel.com/pcsecurity
                                          mcafee.com/deepdefender
                                          mcafee.com/deepcommand



       Visit Intel.com/pcsecurity               Visit McAfee.com
                 Intel.com/ITCenter



10   INTEL IT CENTER | Peer Research
Legal Disclaimers
The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information
contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the
information to any specific situation or circumstance. 

This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF
ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.

Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel
Corporation in the U.S. and other countries.

McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,
in the United States and other countries.

Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.

*Other names and brands may be claimed as the property of others.




11       INTEL IT CENTER | Peer Research
Insights on endpoint security and stealthy threats

Más contenido relacionado

Más de Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Más de Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Insights on endpoint security and stealthy threats

  • 1. Insights on Endpoint Security and Stealthy Threats Intel’s IT Manager Survey
  • 2. IT Managers Speak Out 400 IT Professionals: 200 U.S., 200 U.K. Benchmarking data for your own IT initiatives: • Key security concerns for endpoint devices and mobile workers • Perspective on consumerization and Bring Your Own Device (BYOD) • Impact and high costs of rootkit attacks in the enterprise environment • Top trusted security vendors for protecting against viruses and malware 2 INTEL IT CENTER | Peer Research
  • 3. Top Five Findings 1| Securing endpoint devices, cloud computing, and consumerization are top concerns 2| Data protection is the leading concern for mobile workers 3| There is greater support for consumerization in the United States 4| One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents 5| Rootkits bring tough consequences—including a one-week detection time 3 INTEL IT CENTER | Peer Research
  • 4. Securing Endpoint Devices Level of Security Concern % Very/Extremely Concerned Companies are supporting between 3K and 4K 62% endpoint devices Cloud computing 37% 61% Consumerization/BYOD 51% Top concerns are endpoint 60% Endpoint devices device security, cloud, 39% and consumerization Lack of IT control 56% 42% 52% Virtualization 30% Consumerization is the leading concern for IT Lack of IT visibility 48% 36% managers in the U.K. U.S. (n=200) U.K. (n=200) 4 INTEL IT CENTER | Peer Research
  • 5. Security Concerns for Mobile Workers Four in five companies Specific Remote Security Concerns Among Those Supporting Remote Employees are supporting mobile and remote workers 79% Data protection 69% Half of all respondents Consequences of lost 62% or stolen devices 61% are concerned about the ability to maintain adequate Malware infection 47% 59% levels of mobile security Compliance breach 55% or violation 49% 48% Loss of IT control Data protection is the 52% leading concern for both countries U.S. (n=164) U.K. (n=170) 5 INTEL IT CENTER | Peer Research
  • 6. Consumerization: Friend or Foe? 80 percent of IT managers BYOD Perception in the United States support BYOD in Creates a security risk 64% 58% the enterprise 56% Allows employees to connect remotely 42% 32 percent of IT managers in Improves employee morale 38% 50% the U.K. feel it shouldn’t be 40% allowed in the enterprise Lowers equipment cost 44% 46% Boosts productivity 36% Leading perceptions are 20% Should not be allowed both positive and negative 32% (remote connectivity, security risks) U.S. (n=200) U.K. (n=200) 6 INTEL IT CENTER | Peer Research
  • 7. Experience with Stealthy Threats One in four U.S. Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack IT managers has experienced a rootkit attack—10 percent higher Ensure antivirus is updated 68% 67% than reported by U.K. 68% Password changes 64% 60% Time to detection was Add additional security technologies 67% approximately one week— 58% spreading malware, Enforce stricter Web usage policy 64% impacting productivity 57% End-user security awareness training 67% Led to changes U.S. (n=60) to IT security U.K. (n=39) 7 INTEL IT CENTER | Peer Research
  • 8. Rootkit Attacks Costly, Complex Total cost of recovery estimated at $10K Rootkit Attack (U.S.) and often required Significant Differences by Rootkit Attack Experience Yes No reinstalling or reimaging n=99 n=301 the operating system Median endpoint security products deployed 4.0 2.7 Approximately one-quarter Support multiple OS platforms 75% 51% of employees experienced an impact to productivity Concerned about mobile/remote security 63% 44% Current products sufficient in 58% 41% Key differences noted based protecting against rootkits on attack experience 8 INTEL IT CENTER | Peer Research
  • 9. Top Security Vendors For rootkit prevention, Symantec, McAfee, 1 and Microsoft ranked almost equally IT managers with rootkit attack experience more 2 likely to use multiple security vendors McAfee reported as the most commonly deployed 3 endpoint security vendor 9 INTEL IT CENTER | Peer Research
  • 10. Learn More • Read the full research report, Insights on Endpoint Security and Stealthy Threats • Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system: intel.com/pcsecurity mcafee.com/deepdefender mcafee.com/deepcommand Visit Intel.com/pcsecurity Visit McAfee.com Intel.com/ITCenter 10 INTEL IT CENTER | Peer Research
  • 11. Legal Disclaimers The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.  This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and other countries. McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc., in the United States and other countries. Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others. 11 INTEL IT CENTER | Peer Research