CISO MAG - Free Issues Endpoint Security Powerlist | 页面 2

INDEX Vo l u m e 3 KNOWLEDGE HUB The Need for Layer 8: Why the OSI Model Isn’t Enough for Application Security Issue 10 Vo l u m e 3 Issue 10 Volume 3 | Issue 10 November 2019 COVER THEME 06 Editorial 18 Opinionated Articles on Endpoint Security Trends International Editor Amber Pedroncelli [email protected] EDITOR’S NOTE 2 COVER STORY 38 Research report: The State of Endpoint Security in Enterprises UNDER THE SPOTLIGHT Samu Konttinen, President and CEO, F-Secure Corporation TABLE TALK 54 66 Barbara Lawler, Chief Privacy and Data Ethics Officer, Looker Endpoint security is not new to enterprises. With the proliferation of devices (official and personal) on enterprise networks, securing the endpoints became a priority for organizations years ago. And now, there is a huge demand for endpoint security solutions. Mordor Intelligence estimates the endpoint detection and response (EDR) market will grow to US$ 3,443.64 million by 2024, growing at a CAGR of 22.97 percent, between 2019 and 2024. To understand how companies are consuming endpoint protection solutions, CISO MAG conducted a multiple-choice survey in October 2019. The results of this global survey form the basis of our research and conclusions on the state of endpoint security. Some key findings, as you will read in our cover story: half of all companies (53.19%) that participated in this survey are using both EPP (Endpoint Protection Platform) and EDR solutions. An integrated solution that offers the best of both worlds is the preferred choice. Two-thirds (62.55%) said their endpoint solution included Managed Endpoint Detection Services. So, many are opting for specialized cloud-based services to monitor and manage endpoints with advanced threat protection. In this issue, you will also find our Power List of market-leading endpoint security solutions. The Power List is put together by the CISO MAG editorial team. CISO MAG also acknowledges institutions and individuals for their achievements and contributions to cybersecurity. We’ve included a section with a report of the CISO MAG Summit & Awards – Middle East. The event was conducted on 21 October, 2019 in Dubai. Tell us what you think of this issue. If you have any suggestions, comments or queries, please reach us at [email protected]. Jay Bavisi Editor-in-Chief BRAND STORY The Power List of market leading endpoint security solutions companies. Researched and compiled by CISO MAG editors. CISO MAG | November 2019 78 125 21 October, 2019 in cybersecurity. A Honoring excellence report on the CISO MAG Summit & Awards in the Middle East. Principal Editor Brian Pereira [email protected] Senior Feature Writer Augustin Kurian [email protected] Feature Writer Rudra Srinivas [email protected] Technical Writer Mihir Bagwe [email protected] Media and Design Media Director Saba Mohammad [email protected] Sr. Graphics Designer Sameer Surve [email protected] UI/UX Designer Rajashakher Intha [email protected] Management Executive Director Apoorba Kumar* [email protected] Senior Director, Compliance & Governance Cherylann Vanderhide [email protected] Deputy Business Head Jyoti Punjabi [email protected] Marketing and Business Development Officer Riddhi Chandra [email protected] Digital Marketing Manager Jiten Waghela [email protected] Publishing Sales Manager Taruna Bose [email protected] Technology Director of Technology Raj Kumar Vishwakarma [email protected] * Responsible for selection of news under PRB Act. Printed & Published by Apoorba Kumar, E-Commerce Consultants Pvt. Ltd., Editor: Rahul Arora. The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. CISO MAG | November 2019 3