by Lloyd Tanaka, Product Marketing Manager

 

28th JANUARY, 2019:

 

Meeting endpoint security challenges will take center stage for many enterprises in 2019 says Forrester Research in their latest endpoint research. The potency and diversity of attacker methods, an increased focus on user risk, and endpoint security professionals as data stewards are three top trends voiced by security decision makers. These concerns will likely influence endpoint security purchases.

 

The top five security solutions cited for acquisition in 2019 are antimalware, patch management, full disk encryption, endpoint detection and response (EDR) and URL filtering. In regards to the purchasing of endpoint security solutions, Forrester offered these four recommendations:

 

  • Prioritize suites with the ability to complement other security functions

Best-of-breed functions have been consolidated into full-featured suites so pure point products are a less attractive option. Integrated security suites can offer a host of vital functionality, including behavioral detection, EDR, data security, and automation and orchestration.

 

  • Go further with data security

Endpoint security tools with built-in data security controls (such as native encryption management and data flow mapping) are becoming increasingly more important to enterprises.

 

  • Consider endpoint security as a core component of your Zero Trust architecture

Device security controls must be dynamic and based on real-time risk to users and your organization’s data.

 

  • Consider outsourcing endpoint security to a managed service provider

Staffing remains a key challenge for security leaders, and that makes managed services an appealing option.

 

Many of Forrester’s recommendations has been realized in Check Point SandBlast Agent. For example, SandBlast offers a unique threat extraction feature that eliminates potential threats and promptly delivers safe data files to users. Behavioral Guard is one of many threat engines that can detect suspicious behaviors before an attack is unleashed on an organization.

 

Learn more about Check Point’s Sandblast Agent here.

 

 

 

 

You may also like