CISO MAG - Free Issues Endpoint Security Powerlist | Page 48

COVER STORY BUZZ Vo l u m e 3 Issue 10 Vo l u m e 3 Issue 10 COVER STORY Z Z U B 5. Monitoring and managing endpoints 70% For your endpoint security deployment how do you do ongoing security monitoring and management of the endpoints? 65.11% 11.91% In the previous data point and chart, we see a preference for managed endpoint services. However, the management and monitoring of the endpoints continue to remain in-house for most of the respondents (65.11%). With increased confidence in cloud-native endpoint solutions, organizations will eventually cede more control to specialized third-party service providers (MSSP/MDR). Specialized MSSP/MDR (third-party) Regulation and compliance could be the reason why endpoints are managed in-house and on-premise. Some nations forbid data from residing on servers outside their borders. And endpoint management service providers could have their servers located anywhere in the world. 60% 50% 40% 22.98% 30% 20% 10% 0% Inhouse Managed Service from product vendor 6. Primary and secondary considerations 48 Pricing, flexible licensing When considering an endpoint security solution, what is the primary consideration? 5.96% Response and effectiveness of the solution 15.74% 1.28% Frequency of updates and patching 12.34% 28.09% Simple management console/ ease of use 49 Robust threat protection, leveraging AI, ML, deep learning 28.51% 2.55% Integration with SIEM and other security solutions 5.53% Managed professional services Scalability of the product Pricing, flexible licensing 8.09% When considering an endpoint security solution, what is the secondary consideration? Among the various selection criteria, we observe that the primary consideration for most organizations (28.09%) is response and effectiveness of the solution. Many respondents (28.51%) also look for Robust threat protection, leveraging AI, ML, deep learning. 2.55% 17.87% 17.87% Response and effectiveness of the solution 22.98% Among the various selection criteria, we observe that the secondary consideration for most organizations (22.98%) is pricing and flexible licensing. Frequency of updates and patching 18.30% Simple management console/ ease of use Robust threat protection, leveraging AI, ML, deep learning 5.11% Integration with SIEM and other security solutions 7.23% Managed professional services Scalability of the product CISO MAG | November 2019 CISO MAG | November 2019