Endpoint protection software gartner
Additional UEM vendors to watch include Blackberry, Citrix, IBM, Microsoft, and Sophos.
In addition, Ivanti provides customers with security solutions integrated into their UEM platform, including mobile threat defense (MTD) and passwordless multi-factor authentication (zero sign-on). Unified Endpoint Management (UEM) leaders include Ivanti, whose platform reflects industry leadership with advanced unified endpoint management capabilities. UEM’s benefits include streamlining continuous OS updates across multiple mobile devices and platforms, enabling device management, and having an architecture capable of supporting a wide range of devices and operating systems.Īnother benefit enterprises mention is automating internet-based patching, policy, and configuration management. Like ZTNA, there’s been rapid innovation occurring in UEM over the last twelve months, with reduced security and compliance risks being the goal. Unified Endpoint Management (UEM) proves its value by unifying identity, security, and remote access within Zero Trust Security or ZTNA frameworks now considered essential for securing an anywhere workforce. Under budget pressure to deliver more with less, CISOs want to consolidate their tech stacks and save the budget for new technologies. CISOs will focus more on consolidating endpoint systems starting with UEM Gartner also notes that “cloud-based ZTNA offerings improve scalability and ease of adoption.” Absolute Software’s acquisition of NetMotion is a leading indicator of how active endpoint security mergers and acquisitions will be in 2022 as vendors look to combine unique strengths into unified platforms that CISOs need to improve endpoint security enterprise-wide. Gartner’s latest hype cycle for endpoint security observes that the current generation of ZTNA applications has improved user experiences, increased customization flexibility, and improved persona and role-based adaptability. These three areas are crucial for securing IT infrastructure, operations-based systems, and protecting customer and channel identities and data. Organizations need to ensure their zero trust security frameworks with Identity Access Management (IAM), network security, and web security are consistent with a business-driven approach to funding a new cybersecurity framework. Ericom’s Zero Trust Market Dynamics Survey published earlier this year found that 80% of organizations plan to implement zero-trust security in less than 12 months, and 83% agree that zero trust is strategically necessary for their ongoing business.Įricom’s zero-trust survey confirms that cybersecurity investments are just as much a business decision as an operational one. Zero trust security’s contributions to endpoint security accelerate in 2022ĬISOs tell VentureBeat that zero trust security or zero-trust network access (ZTNA) framework decisions are table stakes for building the business cases they need to get additional funding in the future. With that goal in mind, the following are the trends that will most improve endpoint security in 2022: 1. Proving endpoint security’s business case sets the foundation for CISOs to win budget approvals in 2022 and beyond. Identifying the trends that will accelerate positive business outcomes from endpoint investments is a good starting point. Which endpoint security trends matter mostįor CISOs and their teams, there’s no shortage of possible directions to pursue when it comes to endpoint security in 2022. Furthermore, CISOs tell VentureBeat that the trend is accelerating quickly as the work to build business cases to increase endpoint investment uncovers previously unknown gaps in endpoint security that leave their organizations vulnerable to breaches and cyberattacks. Its 2021 Endpoint Risk Report found that over-configuring endpoints leave them just as vulnerable as not having any endpoints at all.Ībsolute’s survey also found that 76% of IT security decision-makers say their enterprises’ investment and use of endpoint security has increased in 2021. Those are two of the more valuable findings from Absolute Software’s report earlier this year. While 82% of CISOs have reevaluated their security policies in response to the support needed for work-from-home (WFH) and virtual teams, endpoints often lack needed patches to stay secure or are overloaded with conflicting software agents.