Top 5 trends for endpoint security In 2022

Hear from the CIO, CTO and other C-level and senior executives on data and AI strategies at the Future of Work Summit on January 12, 2022. Learn more


Bad artists continue to take advantage of the widening gap in endpoint security that all organizations are planning to improve in 2022. Chief Information Security Officers (CISOs) and their teams are thin and called upon to support large virtual workforces, cloud transition infrastructure, and secure endpoints in increasingly unforeseen threats. It is important to automate end point security to thwart increasingly complex cyber attack strategies.

Gartner’s latest Endpoint Protection Platform predicts that global enterprise costs will reach $ 13.3 billion in 2021, rising to $ 26.4 billion in 2025, with a compounded annual growth rate of 18.7%. Gartner’s latest predictions reflect that endpoint security is a priority for enterprises today.

We are getting endpoint security only in 2022

While 82% of CISOs have re-evaluated their security policies in response to the support needed for work-from-home (WFH) and virtual teams, endpoints often lack the necessary patches to stay safe or are overloaded with conflicting software agents. Those are two more valuable findings from the Absolute Software report earlier this year. Its 2021 Endpoint Risk Report found that over-configuring endpoints makes them just as sensitive as having no endpoints at all.

Absolute’s survey also found that 76% of IT security decision makers say their enterprise investment and use of endpoint securities will increase in 2021. In addition, CISOs tell VentureBeat that the trend is growing rapidly due to the work of creating business cases to increase endpoint investment. Endpoint exposes previously unknown gaps in security that make their organizations vulnerable to breaches and cyber attacks.

Which end point security trends are most important

For CISOs and their teams, there is no shortage of potential directions to follow when it comes to endpoint security in 2022. A good starting point is to identify the trends that will drive positive business results from the end point investments. Proving the business case of endpoint securities lays the foundation for CISOs to win budget approvals in 2022 and beyond. With that goal in mind, here are the trends that will greatly improve endpoint security in 2022:

1. Contribution of Zero Trust Security to accelerate end point security in 2022

CISOs tell VentureBeat that Zero Trust Security or Zero-Trust Network Access (ZTNA) framework decisions are table stacks for building the business cases needed to raise additional funds in the future. Ericom’s Zero Trust Market Dynamics survey, released earlier this year, found that 80% of organizations plan to implement zero-trust security in less than 12 months, and 83% agree that zero trust is strategically needed for their ongoing business.

Ericom’s Zero-Trust Survey confirms that cybersecurity investing is as much a business decision as an operational decision. Organizations need to ensure that their Zero Trust Security Framework with Identity Access Management (IAM), Network Security and Web Security is compatible with the business-oriented approach to funding the new Cyber ​​Security Framework. These three areas are crucial for securing IT infrastructure, operations-based systems and customer and channel identity and data.

Gartner’s latest hype cycle for endpoint security observes that the current generation of ZTNA applications has improved user experiences, increased customization flexibility, and improved personality and role-based adaptability. Gartner also notes that “cloud-based ZTNA offerings improve scalability and ease of adoption.” NetMotion’s acquisition of the complete software is a leading indicator of how many active endpoint security mergers and acquisitions there will be in 2022 as vendors see the integration of unique strengths into unified platforms that CISO needs to improve endpoint security enterprise-wide.

2. CISOs will focus more on integrating endpoint systems starting with UEM

Under budget pressures to deliver more at lower costs, CISOs want to consolidate their tech stacks and save budgets for new technologies. Unified Endpoint Management (UEM) demonstrates its value by integrating identity, security and remote access within the Zero Trust Security or ZTNA framework that is now considered essential for securing the workforce anywhere. Like ZTNA, UEM has been undergoing rapid innovation in the last 12 months, with the goal of reducing security and compliance risks. The advantages of UEM include streamlining OS updates across multiple mobile devices and platforms, enabling device management, and architectures capable of supporting a wide range of devices and operating systems.

Another benefit of automating Internet-based patching, policy and configuration management is mentioned by the enterprise. Among the Unified Endpoint Management (UEM) leaders is Avanti, whose platform reflects industry leadership with advanced Unified Endpoint management capabilities. In addition, Ivanti offers customers integrated security solutions across their UEM platforms, including Mobile Threat Defense (MTD) and passwordless multi-factor authentication (zero sign-on). Additional UEM vendors to look at include BlackBerry, Citrix, IBM, Microsoft and Sophos.

3. The breakout of self-healing endpoints will be in the year 2022

Organizations are accelerating the process of adopting self-healing endpoint platforms, requiring more resilient, continuous endpoint protection that provides greater visibility and control. CISOs of Healthcare, Insurance, Financial Services and Manufacturing tell VentureBit that self-healing endpoints are a high priority in 2022, given their potential to bring greater scale, security and speed to IT and cybersecurity operations.

Self-diagnosis at Self-Healing Endpoint is designed to, when combined with adaptive intelligence, recognize the attempts of violation and take immediate action to thwart them. Shuts itself off after self-healing endpoints, re-examines all OS and application versions, including patch updates, and resets itself to an optimized, secure configuration. All these activities take place without human intervention. Absolute Software, Akamai, Blackberry, Cisco’s Self-Healing Networks, Events, Malwarebytes, McAfee, Microsoft 365, Qualis, Sentinellon, Tanium, Trend Micro, Webroot and many more claim that their endpoys .

4. AI, Behavioral Analytics and Firmware-Embedded Technologies Redefine Endpoint Management

The unique software approach to providing self-healing endpoints based on firmware-embedded connections, which cannot be removed from every PC-based endpoint, with their real-time visibility and control of endpoint devices, makes them a prime example of innovation in Endpoint. Is. Security today. Absolute customers say their persistence technology effectively improves endpoints, providing resilience and autonomous response to breach attempts.

Endpoint Security is another innovator, and its AI-based neurons platform relies on bots to identify discrepancies and detect threats in real-time, eliminating risks in the process. One of Neuron’s design goals is to improve IT Service Management (ITSM) and IT Asset Management (ITAM) so that IT teams can get a comprehensive picture of IT assets from the cloud to the edge. A third example of innovation is the Microsoft Defender 365, which relies on behavior-based search and machine learning and self-heals endpoints. By constantly scanning every artifact in Outlook 365, Microsoft Defender 365 is one of the most advanced self-healing endpoints for correlating threatening data from emails, endpoints, identities, and applications. When there is a suspicious event, the automated investigation results classify the potential hazard as malicious, suspicious, or no threat has been found. Defender 365 then takes autonomous measures to correct malicious or suspicious artifacts.

5. Enterprise will turn to AI and ML-based approaches to combat ransomware

2021 is the worst year for ransomware attacks, with schools, colleges, universities and hospitals among the most attacked organizations globally. Bad artists give them first priority because they have the smallest cyber security budget and the weakest defense. In the first six months of 2021, global ransomware volume reached a record 304.7 million attack attempts, surpassing 304.6 million attack attempts across 2020, according to Sonic Capture Labs’ 2021 Sonicwall Cyberthreet report, a mid-year update. Several high-profile ransomware attacks, including Colonial Pipeline, Cassia and JBS Meat Packing, reflect how bad artists focus on large-scale disruptions to pay for high bitcoin and cryptocurrency. While CISOs rely on inventory-based approaches to securing endpoints, it is likely that not all patch updates will be applied consistently to each endpoint device.

Instead of relying on inventory-based approaches in 2022, CISOs and security teams will adopt a more AI and machine learning-based approach that will benefit machine learning algorithms and convoluted neural networks monitored together with boat technology to identify discrepancies in data faster than any inventory. – can orient approach. Bots can identify which endpoints need updates and generate the most current and historical data to identify their potential risk levels, specific patch updates, and the order in which to build the needs of a given endpoint device.

The acquisition of Microsoft RiskIQ and RiskSense is a harbinger of further mergers and acquisitions in 2022 that focus on thwarting ransomware attacks. Achieving Resuscence with RiskSense’s Vulnerability Intelligence and Vulnerability Risk Ratings, Ivanti obtained the largest and most diverse data set of ransomware attacks. RiskSense’s risk rating includes adverse risk prioritization and validation based on factors such as data-driven patch management, risk intelligence, in-the-wild exploit trends, and security analyst recognition. It is interesting to track the use of bots to automate patch management by identifying and prioritizing risks and risks, with CrowdStrike, Ivanti and Microsoft being the leading vendors in this field.

End point security in 2022

Improving endpoint security is a goal that all organizations will strive for in 2022. Over the next 12 months, the business case of running cybersecurity investments will become more urgent and focused. Assume that threats will become more intelligent, deceptive and difficult to identify. How organizations allocate budgets for endpoint security and identify risk vectors that can have the most impact on revenue and their businesses is a more challenging decision.

Their potential to address complex ransomware risks is key before emerging technologies and affect business operations. Adopt zero-trust security and apply at least privileged access when considering each identity as a new security perimeter. And the growth of machine identification, estimated by Forrester at twice the rate of humans, represents the scale of the challenges that every organization will face in the next twelve months. 2022 will be a challenging year for endpoint security, which is going to give valuable lessons on how to protect every endpoint, be it machine or human identity. Barb up. It will be a rough ride.

Venturebeat

VentureBeat’s mission is to become a digital town square for technical decision makers to gain knowledge about transformative technology and practices. Our site delivers essential information on data technologies and strategies so you can lead your organizations. We invite you to access, to become a member of our community:

  • Up-to-date information on topics of interest to you
  • Our newsletters
  • Gated idea-leader content and discounted access to our precious events, such as Transform 2021: Learn more
  • Networking features and more

Become a member

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *