Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

3 Trends and Facts of the Endpoint Security Industry in 2015

June 15, 2017

3 Trends and Facts of the Endpoint Security Industry in 2015


The bring-your-own-device strategy continues to provide efficiency and flexibility for many companies — Intel noted in 2013 that its BYOD program delivered about 5 million hours of productivity gains — but with all those benefits come risks.

Endpoint security, a network protection approach that locks down every computing device within a corporate environment, has become a major part of preventing unauthorized access for your customers.

Here's what you should know about what's happening in the endpoint security industry this year.

1. Move from BYOD to CYOD

Mobile malware is becoming such a serious issue that some security experts have noted even remote wipes aren't enough to protect corporate networks. Security researcher Kim Crawley points out that doing penetration testing and security is now complicated by employee devices, since few companies wouldn't meet resistance in asking staff to hand over smartphones for a few days for endpoint security measures.

The solution? Crawley predicts that many businesses will scrap BYOD policies altogether and opt instead for CYOD — choose your own device, a strategy in which the company supplies a device and controls all communications and access through the IT department. At the very least, your customers are likely to express more awareness about BYOD security and ask about possible security solutions.

2. Rise of endpoint monitoring

Understanding every aspect of a system, including potential security weaknesses, is crucial for better protection, so it's no surprise that endpoint monitoring is gaining more prominence. This strategy allows companies to collect granular data about the performance and functionality of every endpoint.

Not only does this type of monitoring help to manage endpoints, but it's becoming more popular for facilitating forensic investigation after a device compromise, according to an RSA Conference post. The monitoring function has also been called endpoint threat detection and response (ETDR) and the post notes that this area of endpoint security "is pretty shiny nowadays."

3. Continuing to consolidate

Although mobile devices get a great deal of attention in the endpoint security industry, the term also encompasses laptops, desktops, servers, and security software like anti-virus and anti-spyware. Security researcher Lenny Zeltser notes that the general trend in the endpoint security industry has been to consolidate disparate applications into a unified product, or at least into a suite of integrated products that play well together.

These endpoint protection suite products are designed to manage anti-malware protection, device control, web security, and access authorization in a centrally managed way. As one of security trends of 2015, look for these suites to keep developing and becoming more robust, especially when it comes to ease-of-use and software integration. 

Like other aspects of corporate protection, endpoint security is an ever-evolving field, and so it's worth keeping up with changes in the months ahead so your customers can benefit from your insights. Resellers who can pinpoint the latest trends and facts in endpoint security can stand out in the choppy, risk-filled waters of corporate networks.

 What trends are you seeing in endpoint security? Share in the comments here.