SHARE
Facebook X Pinterest WhatsApp

Understanding the State of Endpoint Security

Understanding the State of Endpoint Security What You Need to Know About the State of Endpoint SecurityBy Ericka Chickowski No Title The Ponemon Institute recently conducted a study on behalf of Lumension to take the pulse of decision makers from both IT security and IT operations groups about endpoint management and security. Unsurprisingly, Ponemon found […]

Nov 20, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Understanding the State of Endpoint Security

What You Need to Know About the State of Endpoint SecurityBy Ericka Chickowski

2No Title

The Ponemon Institute recently conducted a study on behalf of Lumension to take the pulse of decision makers from both IT security and IT operations groups about endpoint management and security. Unsurprisingly, Ponemon found among the key findings that endpoint management systems still remain too complex and costly for organizations and IT ops and security still don’t quite see eye-to-eye when it comes to keeping endpoints both safe and reliable. The study surveyed more than 3,000 participants from five countries, with a rough half-and-half ratio between ops and security players.

3Security Budgets Hold

More than 53% of participants reported that their IT security budget will likely stay the same in 2010.

4Endpoint Disruptors

Among key technologies that affect the manageability and security of endpoints, the one most likely to see increased use in 2010 was cloud computing, with 69% of participants predicting a boost.

5Endpoint Disruptors

Around 68% of those surveyed believed they would increase use of virtualization in 2010.

6Endpoint Disruptors

Another 65% said they would bump up use of Web 2.0 next year.

7Endpoint Management Complexities

On average, organizations have 3.7 software agents installed on each endpoint to perform management, security or other operations tasks.

8Endpoint Management Complexities

The average number of distinct software management consoles for endpoint operations tallies up to 3.9.

9Personal Devices, No Policies

Approximately 40% of respondents reported that employees can connect their own devices to enterprise networks, yet only 26% have a policy that permits those employees to do so.

10Ops-Security Collaboration Woes

Only 17% of those surveyed see collaboration between security and operations as excellent.

11Ops-Security Collaboration Woes

31% believe collaboration between the two groups is poor or non-existent in their organizations.

12Ops-Security Collaboration Woes

The perception of problems in managing endpoints differs between ops and security.

13Ops-Security Collaboration Woes

For example, 43% of operations people said that overly complex technology is a top difficulty with endpoint management, while only 18% of security responded similarly.

14Ops-Security Collaboration Woes

In the same vein, 41% of security participants listed misalignment of IT with the business as a top difficulty, while only 24% of operations respondents said the same.

15Some Agreement

One problem that both groups agreed was a big problem: lack of skilled personnel.

16PC Lifecycle Management

Currently only 38% of surveyed organizations have PC lifecycle management solution that includes features such as asset, configuration or patch management.

17PC Lifecycle Management

An additional 41% say they plan on implementing such a tool in the next one to two years.

18Endpoint Management Wish List

80% of all respondents wish for antivirus and antimalware in their integrated endpoint management suite.

19Endpoint Management Wish List

70% wish for whole disk encryption.

20Endpoint Management Wish List

65% want whitelist application control.

21Endpoint Management Wish List

68% demand patch and remediation management.

22Endpoint Management Wish List

61% wish for IT asset management.

Recommended for you...

Exterro Debuts Agentic AI Tools for Data Risk and E-Discovery 
Jordan Smith
Aug 26, 2025
SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.