Study: Endpoint Security Gaps Leave Organizations Vulnerable

Promisec Ltd. recently revealed findings from audits performed at 30 large organizations covering 193,000 corporate endpoints. The results from the findings indicate the prevalence of unauthorized software, rogue processes and endpoint security gaps have the potential for significant security issues at the nation's largest organizations.

Findings of the Promisec summary audit conducted over the last twelve months revealed 25,090 (13 percent) of the corporate PCs surveyed had unauthorized USB devices attached, opening the door to data loss and the opportunity for USB-borne viruses and malware to enter the corporate network. 7720 (4 percent) of corporate PCs had peer-to-peer (P2P) applications installed. 2895 (1.5 percent) of the corporate PCs did not have the latest Microsoft service packs, and 3281 (1.7 percent) had anti-virus monitoring and remediation issues. 2316 (1.2 percent) of the 193,000 audited endpoints were without required third-party desktop security agents. Finally, 1582 (0.8 percent) of endpoints had unauthorized remote control software, and a lesser percentage had unauthorized and unprotected shareware.

As revealed in these findings, data loss and illegal software introductions are the two largest threats, driven by the unauthorized connection of USB-attached mass storage devices.

"Organizations are becoming more adept at identifying security threats to their external networks, but internal network security issues represent a substantial problem for businesses challenged with preventing loss of corporate IP and the infiltration of their networks by malware inadvertently introduced by employees and business partners," said Amir Kotler, CEO of Promisec. "The answer to this problem is first understanding the magnitude of it. The loss of internal financial data, customer lists and proprietary product details can be devastating while the introduction of malware can significantly slow down business efficiency -- all of which can be prevented by implementing a strong endpoint security strategy."

Featured

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.