SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Insights on Endpoint Security
and Stealthy Threats

               Intel’s IT Manager Survey
IT Managers Speak Out
400 IT Professionals: 200 U.S., 200 U.K.




        Benchmarking data for your own IT initiatives:

        •	 Key security concerns for endpoint devices and mobile workers
        •	 Perspective on consumerization and Bring Your Own Device (BYOD)
        •	 Impact and high costs of rootkit attacks in the enterprise environment
        •	 Top trusted security vendors for protecting against viruses and malware




2    INTEL IT CENTER | Peer Research
Top Five Findings

        1|             Securing endpoint devices, cloud computing,
                       and consumerization are top concerns


        2|             Data protection is the leading concern
                       for mobile workers


        3|             There is greater support for consumerization
                       in the United States


        4|             One in four IT managers in the United States has experienced
                       a rootkit attack—10 percent higher than reported by U.K. respondents


        5|             Rootkits bring tough consequences—including
                       a one-week detection time


3   INTEL IT CENTER | Peer Research
Securing Endpoint Devices

                                                                       Level of Security Concern
                                                                            % Very/Extremely Concerned
    Companies are supporting
    between 3K and 4K
                                                                                                                          62%
    endpoint devices                          Cloud computing
                                                                                               37%

                                                                                                                          61%
                                        Consumerization/BYOD
                                                                                                             51%

    Top concerns are endpoint                                                                                             60%
                                             Endpoint devices
    device security, cloud,	                                                                    39%

    and consumerization                      Lack of IT control
                                                                                                                    56%
                                                                                                      42%

                                                                                                                  52%
                                                 Virtualization
                                                                                         30%
    Consumerization is the
    leading concern for IT                  Lack of IT visibility
                                                                                                            48%
                                                                                               36%
    managers in the U.K.

                                                                    U.S. (n=200)
                                                                    U.K. (n=200)




4     INTEL IT CENTER | Peer Research
Security Concerns for Mobile Workers

    Four in five companies                                       Specific Remote Security Concerns
                                                                    Among Those Supporting Remote Employees
    are supporting mobile
    and remote workers
                                                                                                                                79%
                                             Data protection
                                                                                                                          69%


    Half of all respondents             Consequences of lost                                                        62%
                                            or stolen devices                                                      61%
    are concerned about the
    ability to maintain adequate           Malware infection
                                                                                               47%
                                                                                                               59%


    levels of mobile security
                                          Compliance breach                                                  55%
                                                 or violation                                    49%

                                                                                                48%
                                           Loss of IT control
    Data protection is the                                                                             52%

    leading concern for
    both countries                                              U.S. (n=164)
                                                                U.K. (n=170)




5     INTEL IT CENTER | Peer Research
Consumerization: Friend or Foe?

    80 percent of IT managers                                                         BYOD Perception
    in the United States
    support BYOD in                                    Creates a security risk
                                                                                                                                          64%
                                                                                                                                    58%
    the enterprise
                                                                                                                                    56%
                                        Allows employees to connect remotely
                                                                                                                  42%


    32 percent of IT managers in                  Improves employee morale
                                                                                                            38%
                                                                                                                              50%


    the U.K. feel it shouldn’t be
                                                                                                                  40%
    allowed in the enterprise                         Lowers equipment cost
                                                                                                                    44%

                                                                                                                        46%
                                                         Boosts productivity
                                                                                                            36%

    Leading perceptions are                                                                     20%
                                                       Should not be allowed
    both positive and negative                                                                        32%

    (remote connectivity,
    security risks)                                                              U.S. (n=200)
                                                                                 U.K. (n=200)




6     INTEL IT CENTER | Peer Research
Experience with Stealthy Threats

    One in four U.S.                                                      Changes Due to Rootkit Attack
                                                                            Among Those Experiencing Rootkit Attack
    IT managers has
    experienced a rootkit
    attack—10 percent higher                     Ensure antivirus is updated
                                                                                                                               68%
                                                                                                                              67%
    than reported by U.K.
                                                                                                                               68%
                                                          Password changes
                                                                                                                              64%

                                                                                                                        60%
    Time to detection was                Add additional security technologies
                                                                                                                              67%
    approximately one week—                                                                                            58%
    spreading malware,                     Enforce stricter Web usage policy
                                                                                                                              64%

    impacting productivity                                                                                            57%
                                        End-user security awareness training
                                                                                                                              67%




    Led to changes                                                              U.S. (n=60)
    to IT security                                                              U.K. (n=39)




7     INTEL IT CENTER | Peer Research
Rootkit Attacks Costly, Complex

    Total cost of recovery
    estimated at $10K
                                                                                      Rootkit Attack
    (U.S.) and often required           Significant Differences
                                        by Rootkit Attack Experience                  Yes       No
    reinstalling or reimaging                                                        n=99     n=301
    the operating system
                                        Median endpoint security products deployed    4.0        2.7


    Approximately one-quarter           Support multiple OS platforms                75%        51%
    of employees experienced an
    impact to productivity              Concerned about mobile/remote security       63%        44%


                                        Current products sufficient in
                                                                                     58%        41%
    Key differences noted based         protecting against rootkits
    on attack experience




8     INTEL IT CENTER | Peer Research
Top Security Vendors

                     For rootkit prevention, Symantec, McAfee,
         1
                     and Microsoft ranked almost equally



                     IT managers with rootkit attack experience more
         2
                     likely to use multiple security vendors



                     McAfee reported as the most commonly deployed
         3
                     endpoint security vendor




9   INTEL IT CENTER | Peer Research
Learn More


                                       •	 Read the full research report,
                                          Insights on Endpoint Security
                                          and Stealthy Threats
                                       •	 Find out more about Intel® and
                                          McAfee® security solutions designed
                                          to prevent stealthy threats beyond
                                          the operating system:

                                          intel.com/pcsecurity
                                          mcafee.com/deepdefender
                                          mcafee.com/deepcommand



       Visit Intel.com/pcsecurity               Visit McAfee.com
                 Intel.com/ITCenter



10   INTEL IT CENTER | Peer Research
Legal Disclaimers
The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information
contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the
information to any specific situation or circumstance. 

This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF
ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this
information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.

Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel
Corporation in the U.S. and other countries.

McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc.,
in the United States and other countries.

Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries.

*Other names and brands may be claimed as the property of others.




11       INTEL IT CENTER | Peer Research
Insights on endpoint security and stealthy threats

Contenu connexe

Plus de Intel IT Center

Plus de Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Insights on endpoint security and stealthy threats

  • 1. Insights on Endpoint Security and Stealthy Threats Intel’s IT Manager Survey
  • 2. IT Managers Speak Out 400 IT Professionals: 200 U.S., 200 U.K. Benchmarking data for your own IT initiatives: • Key security concerns for endpoint devices and mobile workers • Perspective on consumerization and Bring Your Own Device (BYOD) • Impact and high costs of rootkit attacks in the enterprise environment • Top trusted security vendors for protecting against viruses and malware 2 INTEL IT CENTER | Peer Research
  • 3. Top Five Findings 1| Securing endpoint devices, cloud computing, and consumerization are top concerns 2| Data protection is the leading concern for mobile workers 3| There is greater support for consumerization in the United States 4| One in four IT managers in the United States has experienced a rootkit attack—10 percent higher than reported by U.K. respondents 5| Rootkits bring tough consequences—including a one-week detection time 3 INTEL IT CENTER | Peer Research
  • 4. Securing Endpoint Devices Level of Security Concern % Very/Extremely Concerned Companies are supporting between 3K and 4K 62% endpoint devices Cloud computing 37% 61% Consumerization/BYOD 51% Top concerns are endpoint 60% Endpoint devices device security, cloud, 39% and consumerization Lack of IT control 56% 42% 52% Virtualization 30% Consumerization is the leading concern for IT Lack of IT visibility 48% 36% managers in the U.K. U.S. (n=200) U.K. (n=200) 4 INTEL IT CENTER | Peer Research
  • 5. Security Concerns for Mobile Workers Four in five companies Specific Remote Security Concerns Among Those Supporting Remote Employees are supporting mobile and remote workers 79% Data protection 69% Half of all respondents Consequences of lost 62% or stolen devices 61% are concerned about the ability to maintain adequate Malware infection 47% 59% levels of mobile security Compliance breach 55% or violation 49% 48% Loss of IT control Data protection is the 52% leading concern for both countries U.S. (n=164) U.K. (n=170) 5 INTEL IT CENTER | Peer Research
  • 6. Consumerization: Friend or Foe? 80 percent of IT managers BYOD Perception in the United States support BYOD in Creates a security risk 64% 58% the enterprise 56% Allows employees to connect remotely 42% 32 percent of IT managers in Improves employee morale 38% 50% the U.K. feel it shouldn’t be 40% allowed in the enterprise Lowers equipment cost 44% 46% Boosts productivity 36% Leading perceptions are 20% Should not be allowed both positive and negative 32% (remote connectivity, security risks) U.S. (n=200) U.K. (n=200) 6 INTEL IT CENTER | Peer Research
  • 7. Experience with Stealthy Threats One in four U.S. Changes Due to Rootkit Attack Among Those Experiencing Rootkit Attack IT managers has experienced a rootkit attack—10 percent higher Ensure antivirus is updated 68% 67% than reported by U.K. 68% Password changes 64% 60% Time to detection was Add additional security technologies 67% approximately one week— 58% spreading malware, Enforce stricter Web usage policy 64% impacting productivity 57% End-user security awareness training 67% Led to changes U.S. (n=60) to IT security U.K. (n=39) 7 INTEL IT CENTER | Peer Research
  • 8. Rootkit Attacks Costly, Complex Total cost of recovery estimated at $10K Rootkit Attack (U.S.) and often required Significant Differences by Rootkit Attack Experience Yes No reinstalling or reimaging n=99 n=301 the operating system Median endpoint security products deployed 4.0 2.7 Approximately one-quarter Support multiple OS platforms 75% 51% of employees experienced an impact to productivity Concerned about mobile/remote security 63% 44% Current products sufficient in 58% 41% Key differences noted based protecting against rootkits on attack experience 8 INTEL IT CENTER | Peer Research
  • 9. Top Security Vendors For rootkit prevention, Symantec, McAfee, 1 and Microsoft ranked almost equally IT managers with rootkit attack experience more 2 likely to use multiple security vendors McAfee reported as the most commonly deployed 3 endpoint security vendor 9 INTEL IT CENTER | Peer Research
  • 10. Learn More • Read the full research report, Insights on Endpoint Security and Stealthy Threats • Find out more about Intel® and McAfee® security solutions designed to prevent stealthy threats beyond the operating system: intel.com/pcsecurity mcafee.com/deepdefender mcafee.com/deepcommand Visit Intel.com/pcsecurity Visit McAfee.com Intel.com/ITCenter 10 INTEL IT CENTER | Peer Research
  • 11. Legal Disclaimers The information in this document is provided only for educational purposes and for the convenience of McAfee and Intel customers. The information contained herein is subject to change without notice, and is provided “AS IS” without guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.  This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2012 Intel Corporation. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and other countries. McAfee, the McAfee logo, McAfee ePO, Deep Command, Deep Defender, and ePolicy Orchestrator are trademarks or registered trademarks of McAfee, Inc., in the United States and other countries. Microsoft is the trademark or registered trademark of Microsoft Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others. 11 INTEL IT CENTER | Peer Research