Endpoint security is in many ways the direct descendant of the first forms of computer protection in the earliest days of IT. But it’s a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders.
Trends in endpoint security
Of course, as threats evolve, endpoint security suites must evolve as well. In 2018, expect vendors to work to catch up with the following five trends:
1. Machine learning and AI. As threats accelerate, they’ll become too much, too fast for any human to keep up with in real time. Much of the moment-to-moment scutwork of endpoint security will be increasingly automated, with machine learning and artificial intelligence examining traffic and identifying threats, and only the most pressing needs being escalated to human attention.
2. SaaS-based endpoint security. Traditionally, centralized endpoint security management systems run on a server or appliance that an organization deploys and cares for in-house. But with cloud- or SaaS-based services becoming increasingly trusted as part of IT’s day-to-day operations, we’re seeing endpoint security management being offered as a service, with vendors like FireEye, Webroot, Carbon Black, Cybereason and Morphick all moving into the space.
3. Layered protection against fileless attacks. Fileless attacks, which are perpetrated by malware that resides entirely in RAM and is never written to disk, is an attack vector growing at an alarming rate. Endpoint security vendors are rushing to provide the layered defense necessary against this type of attack.
4. Putting IoT devices under the protective umbrella. One of the big stories of internet security over the past few years is that literally billions of internet-connected “things” — cameras, sensors, routers, what have you — are out there quietly doing jobs without the protection that a device with their computing and network capabilities ought to have.
5. Reducing complexity and consolidating agents. As the market segment has grown, many endpoint security vendors have offered a proliferating and bewildering array of tools, each targeting a specific kind of attack or vulnerability. The upshot is that companies have as many as seven different software agents running on each endpoint, each of which needs to be managed separately.
Source: CSO Online