2019 Endpoint Security Trends
2019 Endpoint Security Trends
Table of Contents
INTRODUCTION 03
KEY INSIGHTS 04
CONCLUSION 10
RESEARCH METHODS 12
Today’s security technology landscape is overcrowded with tools and technologies built to combat endpoint
risk. At the same time, security budgets at many organizations are increasing rapidly, propelled by the mandate
to protect data and devices. In fact, 24 percent of the overall security spend is allocated to endpoint security
tools. And by 2020, the projected total for global IT security spend is $128 billion1. Yet, over 70 percent of breaches
still originate on the endpoint2. Why?
Industry analysts Forrester3 and Gartner4 have warned about the dangers of equating IT security spending
with security and risk maturity. As organizations attempt to make the endpoint more resilient by buying more
security tools, it is creating endpoint complexity. With an average of 10 security agents on each device and over
5,000 common vulnerabilities and exposures (CVEs) found on the top 20 client applications in 20185 alone, the
endpoint has never been more fragile.
This report outlines the findings from extensive primary research analyzing more than six million enterprise
devices over a one-year period. Our analysis led to a stunning discovery: much of endpoint security spend is
voided because tools and agents fail, reliably and predictably.
Studying millions of devices, agents, and apps, uncovered some startling truths:
• 42 percent of all endpoints are unprotected at any given time;
• Two percent of endpoint agents fail per week; meaning,
• 100 percent of endpoint security tools eventually fail — no tool is immune.
The clear conclusion is that increasing security spending does not increase safety. In fact, every additional
security tool only increases the probability of failure and decay. The data in this report provides evidence that
merely investing in more endpoint security tools is ineffective, and a new approach is needed. To secure the
endpoint, the security tools already in place must be made resilient.
1
Morgan Stanley. 2016. Cybersecurity: Rethinking Security.
2
IDC. 2016
3
Pollard, J. 2018. Justify Security Budget By Its Impact On Maturity. Forrester.
4
Moore, S. Gartner Says Many Organizations Falsely Equate IT Security Spending With Maturity. Gartner.
5
MITRE.ORG
10
Security agents
*
per device
70% 35%
5000+
Common Vulnerabilities and
**
Breaches originating
at the endpoint§
Breaches caused by
existing vulnerabilities†
Exposures (CVEs) on the top 20
client applications each year
28%
Endpoints missing
given point in a year antivirus/anti-malware protection
13% 75%
*
Absolute
50% 5%
**
MITRE
§
IDC
†
Forrester
Repaired agents requiring over Repaired agents requiring over
20 repair events within 30 days 100 repair events within 30 days
19% 75%
50% 5%
100% 42%
$128B
As a result, IT leaders are actually seeing a negative return
on investment. In a recent report, Forrester summed
up the situation by stating, “The next crisis for security Global IT security
leaders has arrived, and it’s a crisis of accountability…a spend by 2020
new kind of accountability, with leadership asking them
[security leaders] to show how their investments create
value for the organization8.”
100%
Endpoint protection tools
Top Endpoint Security Risks fail eventually- no tool is
immune
With 70 percent of breaches originating on the endpoint, it
is the number one target for attacks9. Traditional endpoint
security solutions exist to keep devices secure. The three
most common traditional security tools are: encryption,
endpoint protection (AV/AM/EDR), and client and patch
KEY FINDING:
management tools. 1 Endpoint Complexity is Driving Risk
Encryption software protects data, endpoint protection The research found that devices can have 10 or more
protects against cyber threats, and client and patch endpoint security agents installed — including encryption,
management ensures applications are patched and safe AV/AM, and client/patch management options. The
from vulnerabilities. vast number of tools introduces virtually unlimited
combinations, making it all but impossible to properly
The false sense of security they provide may be the test. This leaves enterprises to validate them in live
greatest source of organizational risk. deployments where they all eventually break.
7
Gartner. IT Key Metrics Data 2019: Key IT Security Measures.
8
Forrester. Pollard, J. 2018. Justify Security Budget By Its Impact On Maturity.
9
Forrester. Heidi Shey and Enza Iannopollo. The State of Data Security and Privacy: 2018 to 2019.
Amount of endpoints
21% with outdated
anti-malware/antivirus Encryption
Unified Endpoint
Management (UEM)
+ 7% Amount of endpoints
missing protection
Endpoint Detection
and Response (EDR)
Endpoint Protection
Platform (EPP/AV/AM)
FDE Decay Rate FY ‘18 - Running Difference Even more concerning, encryption recovery times are
y = -1 x 10-8 days3 + 8 x 10-6 days2 - 0.0027 days + 0.5368 lengthy — meaning the window of vulnerability (WOV)
R2 = 0.9984
is large. The average WOV for unencrypted devices is 12
100%
days, but 30 percent of devices remain unencrypted for
% of Total Devices Still Encrypted
KEY FINDING:
60%
3 Failed Agents Prolong Security Exposures
40%
Client management and patching tools break reliably and
20% predictably. 19 percent of endpoints require at least one
client/patch management repair monthly. So, just when
0%
0 5 10 15 20 30 60 90 180 363 they are needed most, one out of five of these agents fails.
# of Days
In addition to the failure rates, patch and client
Cumulative decay, encryption: 365 days management agents are often repeat offenders. Of those
Rate of decay, encryption: 8%/month patching agents requiring repair, 75 percent reported at
least two repair events and 50 percent reported three
or more repair events. Additionally, five percent could be
considered to be chronically ill, with 80 or more repair
a=
v = Ending Velocity
v0 = Initial Velocity Part of our analysis examined the most common endpoint
t t = Time applications — classifying and sub-classifying families of
applications to see how vulnerabilities arise.
5000+
create unnecessary friction for users. The study found an
average of 10 distinct agents layered onto most of the
devices. With this number, it’s inevitable that agents will
collide, be disabled by users, or go unpatched. These blind
spots hinder the visibility of IT and security leaders and
leave endpoints — and the organizations to which they
CVEs discovered on the top 20
belong — increasingly vulnerable over time.
client applications6 each year
It is clear that there is no shortage of security controls. The
real problem organizations face is in ensuring that these
controls remain in place and are functioning at all times.
It is pointless to invest more money into exciting new
The 20 most common client applications published over technologies (such as blockchain, artificial intelligence,
5,000 vulnerabilities in 2018. If every device had only the and machine learning) if the basic measures – visibility,
top ten applications (half), that could result in as many as control, and resilience – are not operating effectively first.
55 vulnerabilities per device just from those top ten apps.
The data has shown how well-functioning controls fail.
This includes browsers, OSs, and publishing tools.
These failures occur without anyone — threat actors,
Client patch management agents fail at double the rate negligent users, and bots — intending for failure to happen.
encryption agents do. However, once failed, an encryption Additionally, it shows how endpoint complexity amplifies
agent reported seven times more repair events than client this natural propensity for device security to degrade over
management agents. time.
IT and security leaders must create an environment which According to Forrester’s “Justify Security Budget By Its
fosters a path to: Impact on Maturity”, security leaders spend too much time
1. Understanding what’s happening on their measuring their performance based on uncontrollable
organization’s devices (Visibility); external factors — threat actors, tool sets, and motivations.
Measuring maturity, instead, focuses on components
2. Responding to suspicious events to enable the
that can be controlled and for which success can truly be
reduction of security degradation (Control); and
defined.
3. Empowering the applications to persist and automate
their restoration when incidents occur (Resilience).
Conclusion
Forrester recently suggested that any security investment
Threats are becoming more sophisticated and
should be measured based on maturity10. Improving
breaches increasingly common, causing anxiety within
maturity requires coordination, scaling, and optimization
organizations. This fear amplifies a pervasive willingness
of a security program’s components. To move the needle,
to purchase more endpoint protection solutions. Endpoint
it is necessary to activate the fundamental security
security spend is greater than ever. And yet, the endpoint
controls on devices to gain a persistent connection to
is “patient zero” in the vast majority of recent breaches,
each endpoint in a fleet.
proving that simply spending more on security tools isn’t
This provides visibility and control to unlock value from enough. While the answer may be decreasing complexity
existing investments. The basic tools in most enterprise on the endpoint, many of those tools are needed.
security portfolios are more than capable of protecting
In addition, the number of combinations of security
devices, data, users, and apps — as long as they are
controls from a variety of vendors makes it impossible to
working.
test pre-deployment by enterprises.
10
Forrester. Pollard, J. 2018. Justify Security Budget By Its Impact On Maturity.
Request a demo
Find out how our solutions can
benefit your organization.
About Absolute
Absolute empowers more than 12,000 customers worldwide to protect devices, data, applications, and users against
theft or attack—both on and off the corporate network. With the industry’s only tamper proof endpoint visibility and control
solution, Absolute allows IT organizations to enforce asset management, endpoint security, and data compliance for
today’s remote digital workforces. Absolute’s patented Persistence® technology is embedded in the firmware of Dell, HP,
Lenovo, and other leading manufacturers’ devices for vendor-agnostic coverage, tamper-proof resilience, and ease of
deployment. See how it works at absolute.com and follow us at @absolutecorp.
E MA I L : S A L ES :
[email protected] absolute.com/request-a-demo
PH O N E :
WEBS ITE:
North America: 1-877-660-2289
absolute.com
EMEA: +44-118-902-2000
© 2020 Absolute Software Corporation. All rights reserved. Absolute, the Absolute logo, and Persistence® are trademarks of Absolute Software Corporation. Other names or logos mentioned
herein may be the trademarks of their respective owners. For patent information, visit absolute.com/patents. ABT-2019-Endpoint-Security-Trends-Report-021120
Research Methods
This report outlines the results from a one-year study conducted by Absolute’s security research team. Data was gathered
from over one billion change events on over six million devices.
The devices represent data from 12,000 anonymized organizations across North America and Europe. Each device had
Absolute’s endpoint visibility and control platform activated.
Researchers applied an Endpoint Resiliency Index to the sample to establish a baseline and monitored the results over a
12-month period. The Endpoint Resiliency Index applies the method used by the World Economic Forum’s Environmental
Performance Index to track the overall direction of key variables of quality.11
To provide further context to the quantitative data, we commissioned a third-party research organization to conduct
in-depth, exploratory interviews with senior executives from Fortune 500 organizations. We also conducted secondary
research of recent studies by industry analysts.
Global Endpoint Risk Research
11
World Economic Forum. 2018 Environmental Performance Index.