INDEX
Vo l u m e 3
KNOWLEDGE HUB
The Need for Layer 8: Why the OSI
Model Isn’t Enough for Application
Security
Issue 10
Vo l u m e 3
Issue 10
Volume 3 | Issue 10
November 2019
COVER THEME
06
Editorial
18
Opinionated Articles on Endpoint
Security Trends
International Editor
Amber Pedroncelli
[email protected]
EDITOR’S NOTE
2
COVER STORY
38
Research report: The State of Endpoint Security in Enterprises
UNDER THE SPOTLIGHT
Samu Konttinen,
President and CEO,
F-Secure Corporation
TABLE TALK
54
66
Barbara Lawler,
Chief Privacy and Data Ethics Officer,
Looker
Endpoint security is not new to enterprises. With the proliferation of devices
(official and personal) on enterprise networks, securing the endpoints became
a priority for organizations years ago. And now, there is a huge demand for
endpoint security solutions. Mordor Intelligence estimates the endpoint
detection and response (EDR) market will grow to US$ 3,443.64 million by 2024,
growing at a CAGR of 22.97 percent, between 2019 and 2024.
To understand how companies are consuming endpoint protection solutions,
CISO MAG conducted a multiple-choice survey in October 2019. The results of
this global survey form the basis of our research and conclusions on the state of
endpoint security.
Some key findings, as you will read in our cover story: half of all companies
(53.19%) that participated in this survey are using both EPP (Endpoint Protection
Platform) and EDR solutions. An integrated solution that offers the best of
both worlds is the preferred choice. Two-thirds (62.55%) said their endpoint
solution included Managed Endpoint Detection Services. So, many are opting
for specialized cloud-based services to monitor and manage endpoints with
advanced threat protection.
In this issue, you will also find our Power List of market-leading endpoint security
solutions. The Power List is put together by the CISO MAG editorial team.
CISO MAG also acknowledges institutions and individuals for their achievements
and contributions to cybersecurity. We’ve included a section with a report of
the CISO MAG Summit & Awards – Middle East. The event was conducted on 21
October, 2019 in Dubai.
Tell us what you think of this issue. If you have any suggestions, comments or
queries, please reach us at [email protected].
Jay Bavisi
Editor-in-Chief
BRAND STORY
The Power List of market leading endpoint
security solutions companies. Researched
and compiled by CISO MAG editors.
CISO MAG | November 2019
78
125
21 October,
2019 in cybersecurity. A
Honoring
excellence
report on the CISO MAG Summit & Awards
in the Middle East.
Principal Editor
Brian Pereira
[email protected]
Senior Feature Writer
Augustin Kurian
[email protected]
Feature Writer
Rudra Srinivas
[email protected]
Technical Writer
Mihir Bagwe
[email protected]
Media and Design
Media Director
Saba Mohammad
[email protected]
Sr. Graphics Designer
Sameer Surve
[email protected]
UI/UX Designer
Rajashakher Intha
[email protected]
Management
Executive Director
Apoorba Kumar*
[email protected]
Senior Director,
Compliance & Governance
Cherylann Vanderhide
[email protected]
Deputy Business Head
Jyoti Punjabi
[email protected]
Marketing and Business Development
Officer
Riddhi Chandra
[email protected]
Digital Marketing Manager
Jiten Waghela
[email protected]
Publishing Sales Manager
Taruna Bose
[email protected]
Technology
Director of Technology
Raj Kumar Vishwakarma
[email protected]
* Responsible for selection of news under PRB Act. Printed & Published by Apoorba Kumar, E-Commerce Consultants Pvt. Ltd., Editor: Rahul Arora.
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not
necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & may not be
appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof may be reproduced, stored
in a retrieval system, or transmitted in any form without the permission of the publishers in writing.
CISO MAG | November 2019
3