In January 2015, Bromium conducted a survey of more than 100 information security professionals, focused on the greatest challenges and risks facing their organizations today. The results indicate that end users continue to remain the greatest security risk, thanks to their tendency to click on suspicious and malicious e-mail and URLs.
Bromium published similar research in June 2014, which determined that 72 percent of information security professionals believe end users are their biggest security headache. Today, 79 percent of information security professionals believe that end users are their biggest security headache.
Additionally, the survey highlights the operational challenges information security professionals face as they struggle to manage multiple point solutions, to respond to the security alerts generated by their users on a daily basis, and to detect and remediate compromised endpoints.
It may seem obvious, but nearly 48 percent of information security professionals believe that having to manage multiple point solutions, many of which are redundant, introduces the most cost and complexity into their security. Logically, more solutions cost more money and take more time to manage. Unfortunately, previous Bromium research has demonstrated that deploying multiple solutions—a “defense-in-depth” architecture—may still leave organizations vulnerable to attack if they are based on the same foundation of traditional pattern-matching or detection.
However, one conclusion we may draw from these responses is that information security professionals could reduce the cost and complexity of their information security programs by reducing the number of point solutions they have to manage by considering new ways to automate or eliminate time-consuming processes, such as responding to security alerts, detecting and remediating endpoints, and testing and deploying urgent patches.
In fact, approximately 20 percent of information security professionals believe that responding to security alerts introduces the most cost and complexity into their security program, while an additional 20 percent believe it is detecting and remediating compromised endpoints. The results suggest that reacting to manual processes that emerge from managing detection-based solutions, such as antivirus or intrusion detection, is the source of considerable frustration for a significant number of information security professionals.
Read the full report, “Endpoint Protection: Attitudes and Trends 2015.”