SlideShare a Scribd company logo
#RSAC
Session ID: TECH-R05
Next-Generation Endpoint Security
Overview
Jon Oltsik
Senior Principal Analyst
ESG
#RSAC
Agenda
2
Endpoint Security Defined
What about antivirus?
The next-generation endpoint security triggers
Next-generation endpoint security market dichotomy
Prevention vs. Detection/Response crowd
Recommendations and lessons learned
#RSAC
What Is An Endpoint?
3
Primary:
Windows PCs
Secondary
#RSAC
Anti-
malware
Endpoint security
controls
Data
security
Application
security
IAM
Acceptable
use policies
Configuration
management
System
monitoring
What is Endpoint Security?
“The policies, processes
and technology controls
used to protect the
confidentiality, integrity,
and availability of an
endpoint system”
#RSAC
Anti-
malware
Endpoint security
controls
Data
security
Application
security
IAM
Acceptable
use policies
Configuration
management
System
monitoring
What is Endpoint Security?
“The policies, processes
and technology controls
used to protect the
confidentiality, integrity,
and availability of an
endpoint system”
#RSAC
What About AV?
6
$5 billion to $7 billion WW market
95%+ penetration rate
Historically dominated by 5 vendors
History of usurping functionality
Application controls, anti-spyware/adware, full-disk encryption
#RSAC
Antivirus Myth and Reality
7
AV is NOT a commodity product (nor is it “dead”)
AV management is often delegated to IT operations groups
AV is not always well maintained
Advanced features:
Not well known or always used
Can have a substantial impact on system performance
Mixed results in terms of efficacy
#RSAC
Endpoint Security Market
8
#RSAC
NG Endpoint Security Triggers
9
Network compromise, cyber-attack, or data breach
Time and resources necessary for system reimaging
Cybersecurity quantum leap
Cybersecurity cavalry to the rescue!
Needs and resource assessment
#RSAC
Endpoint Security Continuum
10
Advanced malware
prevention
Advanced detection
and response (EDR)
Advanced endpoint
controls
#RSAC
11
“Hair-on-fire” problem
Resource constraints
Staff size, skills, time
Endpoint malware prevention may be one of several
cybersecurity initiatives
Endpoint Security Advanced Prevention
#RSAC
Endpoint Security Advanced Prevention
12
Problematic shortage of IT security skills
46%
28%
25%
23%
24%
2016
2015
2014
2013
2012
#RSAC
Advanced Prevention Products
13
New types of algorithms
Process isolation or sandboxing
Behavioral heuristics
Tight integration with threat intelligence
#RSAC
Procurement and Deployment
14
Extensive
background
research
RFI/RFP
Product
testing
POC Pilot project
Enterprise
deployment
#RSAC
Observations
15
Early stage products have obvious flaws
Extensive customer input into product roadmaps
Scale and manageability are high priority requirements
AV replacement is often part of strategy
Enhancements may be required
Windows firewall, application controls, etc.
#RSAC
16
Progressive skills and resources
Strong relationships with existing AV vendor
Not hung up on endpoint agents
Broad approach to anti-malware based upon data analytics
Network sandbox, threat intelligence, open source tools, custom
rules, etc.
Focus on IR automation and orchestration
Advanced Detection and Response
#RSAC
Advanced Detection and Response Products
17
Data collection- and analytics-centric
Windows logs, system activities, forensic capture, etc.
Various requirements for endpoint data collection
Polling, trigger-based, local collection, central collection, etc.
Trend toward real-time continuous collection and visibility
Product GUI and analytics may or may not be important
#RSAC
Procurement and Deployment
18
Basic
background
research
Exploration of
open source and
commercial
offerings
Simple and
concise RFI/RFPs
POC including
product and
process
integration
Pilot project to
test scale and
data
management
Enterprise
deployment
#RSAC
Observations
19
Very demanding user base
Best-of-breed mentality
Customers will likely
Demand product customization and enhancements from vendors
from the start
Want to use products to create (and even distribute) custom
remediation rule sets
“Big brother” issues
#RSAC
Further Analysis
20
Continuum will continue
Rip-and-replace mindset
Possible extensions for data security and insider threat
Cloud-based control plane?
Endpoint security and patching
#RSAC
Action Items
21
Assessment
Existing AV, malware, malicious network traffic, skill sets…
Requirements definition
Comprehensive security requirements
IT and business requirements
Technical requirements
Research and evaluation
Cast a wide net but maintain a focused search
Plan for the long-term

More Related Content

PDF
IDC Security 2014, Endpoint Security in Depth
PPTX
Maturing Endpoint Security: 5 Key Considerations
PPTX
What is Next-Generation Antivirus?
PPTX
NextGen Endpoint Security for Dummies
PPTX
Malware evolution and Endpoint Detection and Response
PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
Ethical hacking/ Penetration Testing
IDC Security 2014, Endpoint Security in Depth
Maturing Endpoint Security: 5 Key Considerations
What is Next-Generation Antivirus?
NextGen Endpoint Security for Dummies
Malware evolution and Endpoint Detection and Response
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Wfh security risks - Ed Adams, President, Security Innovation
Ethical hacking/ Penetration Testing

What's hot (20)

PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPT
Redefining Endpoint Security
PPTX
Security operation center (SOC)
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Owasp Proactive Controls for Web developer
PDF
The Critical Security Controls and the StealthWatch System
PPTX
Incident response live demo slides final
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPT
Safeguard your enterprise against ransomware
PPTX
Improve threat detection with hids and alien vault usm
PDF
RSA: Security Analytics Architecture for APT
PDF
Panda Security - Endpoint Protection
PDF
Practical Enterprise Security Architecture
PDF
Deception Technology: Use Cases & Implementation Approaches
PPTX
SOC Cyber Security
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Incident Response: Validation, Containment & Forensics
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Redefining Endpoint Security
Security operation center (SOC)
From IT to IoT: Bridging the Growing Cybersecurity Divide
Bulding Soc In Changing Threat Landscapefinal
Is Antivirus (AV) Dead or Just Missing in Action
Advanced Persistent Threats (APTs) - Information Security Management
Owasp Proactive Controls for Web developer
The Critical Security Controls and the StealthWatch System
Incident response live demo slides final
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Safeguard your enterprise against ransomware
Improve threat detection with hids and alien vault usm
RSA: Security Analytics Architecture for APT
Panda Security - Endpoint Protection
Practical Enterprise Security Architecture
Deception Technology: Use Cases & Implementation Approaches
SOC Cyber Security
Ad

Viewers also liked (7)

PPTX
Adapt or Die: The Evolution of Endpoint Security
PPTX
Data Security: Why You Need Data Loss Prevention & How to Justify It
PPTX
Insider Threat: How Does Your Security Stack Measure Up?
PPT
5 Myths About Data Loss Prevention
PDF
Endpoint is not enough
PPTX
Data Loss Prevention
PDF
Mastering The Fourth Industrial Revolution
Adapt or Die: The Evolution of Endpoint Security
Data Security: Why You Need Data Loss Prevention & How to Justify It
Insider Threat: How Does Your Security Stack Measure Up?
5 Myths About Data Loss Prevention
Endpoint is not enough
Data Loss Prevention
Mastering The Fourth Industrial Revolution
Ad

Similar to What Is Next-Generation Endpoint Security and Why Do You Need It? (20)

PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Securing 100 products - How hard can it be?
PPTX
Cyber Defense Matrix: Reloaded
PDF
Embedded Systems Security: Building a More Secure Device
PDF
Embedded Systems Security: Building a More Secure Device
PDF
str-w04_next-wave-of-security-operationalization
PDF
Vendor Security Practices: Turn the Rocks Over Early and Often
PDF
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
PDF
Integrating Cybersecurity into Supply Chain Risk Management
PDF
Integrating Cybersecurity into Supply Chain Risk Management
PDF
inSOC Sales Deck Dec 2020.pdf
PPT
Core.co.enterprise.deck.06.16.10
PDF
For Critical Infrastructure Protection
PPTX
Security assessment with a hint of CISSP Prep
PPT
六合彩香港-六合彩
PDF
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
PIRATEs of the Software Supply Chain.pdf
PPT
How PCI And PA DSS will change enterprise applications
PDF
A successful application security program - Envision build and scale
Cybersecurity roadmap : Global healthcare security architecture
Securing 100 products - How hard can it be?
Cyber Defense Matrix: Reloaded
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
str-w04_next-wave-of-security-operationalization
Vendor Security Practices: Turn the Rocks Over Early and Often
str-f02-vendor_security_practices-turn_the_rocks_over_early_and_often
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
inSOC Sales Deck Dec 2020.pdf
Core.co.enterprise.deck.06.16.10
For Critical Infrastructure Protection
Security assessment with a hint of CISSP Prep
六合彩香港-六合彩
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PIRATEs of the Software Supply Chain.pdf
How PCI And PA DSS will change enterprise applications
A successful application security program - Envision build and scale

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

What Is Next-Generation Endpoint Security and Why Do You Need It?