{"id":93554,"date":"2023-06-21T20:58:11","date_gmt":"2023-06-21T20:58:11","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4121078"},"modified":"2023-06-21T20:58:11","modified_gmt":"2023-06-21T20:58:11","slug":"remote-work-and-the-cloud-create-new-endpoint-security-challenges","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=93554","title":{"rendered":"Remote work and the cloud create new endpoint security challenges"},"content":{"rendered":"<div id>\n<p> Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a host of new challenges. Experts weighed in on the subject at the recent Syxsense Synergy event. <\/p>\n<\/div>\n<div id>\n<figure id=\"attachment_3952250\" aria-describedby=\"caption-attachment-3952250\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-3952250\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/06\/remote-work-and-the-cloud-create-new-endpoint-security-challenges.jpg\" alt=\"Illustration of security software protecting endpoints.\" width=\"770\" height=\"503\"><figcaption id=\"caption-attachment-3952250\" class=\"wp-caption-text\">Image: Adobe Stock\/ArtemisDiana<\/figcaption><\/figure>\n<p>Jump to:<\/p>\n<p>The <a href=\"https:\/\/www.syxsense.com\/pricing-syxsense\" target=\"_blank\" rel=\"noopener noreferrer\">Syxsense Synergy<\/a> event last week featured a range of analysts, end users and company spokespeople with a central theme of the convergence of<a href=\"https:\/\/www.techrepublic.com\/article\/enterprise-endpoints-present-risks\/\"> endpoint management <\/a>and security \u2013 two areas that have traditionally remained apart. That separation is no longer feasible, however, due to rising complexity via the cloud, the ever-advancing Internet of Things, remote and hybrid work, and the surge in cybercrime effectiveness.<\/p>\n<p>According to a recent survey by the <a href=\"https:\/\/www.esg-global.com\/hubfs\/Infographic-Managing-the-Endpoint-Vulnerability-Gap.pdf?hsCtaTracking=fba208b5-5ed5-4f85-8575-4cd8d321195d%7Ca9603a60-55da-462b-9cb1-0c986a897715\" target=\"_blank\" rel=\"noopener noreferrer\">Enterprise Strategy Group<\/a>, the average user now has as many as seven devices \u2013 when you take into account office and personal use. That same ESG survey found a correlation between the number of security and endpoint management tools used in an enterprise and the volume of breaches. Six percent of organizations had fewer than five tools in use, 27% used 5 to 10, 33% and used 11 to 15. The rest used more than 15 tools.<\/p>\n<p>\u201cThose with the most tools were found to have suffered the most attacks,\u201d said Gabe Knuth, a senior analyst at Enterprise Strategy Group. \u201cThat\u2019s why there is a growing need for the convergence of the security and endpoint management groups within organizations to address attack surface management, vulnerability protection and automated remediation.\u201d<\/p>\n<p><strong>SEE: Report:<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/shadowit-leaves-security-grappling-low-visibility\/\"><strong> Too many enterprises have shadow IT \u2013 unlocked doors with no cameras<\/strong><\/a><strong> (TechRepublic)<\/strong><\/p>\n<h2 id=\"lack\">Lack of security, endpoint management tool training increases risk<\/h2>\n<p>This doesn\u2019t mean that security and endpoint management tools are bad. Ashley Leonard, Syxsense founder and CEO, believes that a big reason for the correlation between the quantity of attacks and the number of tools is lack of training.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<p>\u201cIf people are not properly trained and grooved in on their endpoint and security tools, you are going to find devices and systems misconfigured, not maintained properly and with critical patches undeployed,\u201d said Leonard. \u201cTraining is vital, but it is much easier to train people on a single tool,\u201d he added.<\/p>\n<p>Accordingly, his company has brought patching, vulnerability scanning, endpoint management, <a href=\"https:\/\/www.techrepublic.com\/article\/top-mdm-solutions\/\">mobile device management<\/a>, zero trust and automated remediation into one platform. By converging functions, there are fewer gaps in coverage and the organization gains the ability to respond faster and more effectively to threats, Leonard said.<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/zero-trust-authentication\/\"><strong>For credentials, these are the new Seven Commandments for zero trust<\/strong><\/a><strong> (TechRepublic)<\/strong><\/p>\n<h2 id=\"endpoint\">Endpoint management, security convergence challenges<\/h2>\n<p>ESG research highlights, however, that there are definite barriers standing in the way of convergence.<\/p>\n<p>Some organizations are blocked by existing reporting and organizational structures that cling firmly to old ways. Separate endpoint management and security teams report on different channels. The CIO or CTO might look after one team while the CISO looks after another. Such structures may resist consolidation.<\/p>\n<p>Similarly, some teams are organized by device type only: one group looks after PCs or laptops, and another takes care of smartphones. Budget structures, too, may stand in the way.<\/p>\n<p>\u201cSome organizations prefer to keep things the way they are and avoid disruption of end users,\u201d said Knuth. \u201cIn my experience, it is more successful when teams work closely together.\u201d<\/p>\n<h2 id=\"automation\">Automation and convergence<\/h2>\n<p>Yet adding many endpoint and security functions into one tool only works if everything is integrated.<\/p>\n<p>\u201cThe more you can automate, the quicker you can respond, which frees up resources to work on strategic activities,\u201d said Leonard.<\/p>\n<p>He gave an example of patch management to highlight both the importance of automation and the degree of complexity that exists in the workflows utilized by different tools. Patches need to be tested, but that testing must be done rapidly if a security flaw is going to be handled before a breach takes place. Patch deployments need to be carried out in stages, starting with only a few devices to verify that nothing breaks \u2013 Leonard cited instances of Microsoft and other updates crashing endpoints and applications.<\/p>\n<p>Once a few patches have been deployed successfully, roll them out to a larger group, he advised. This group should not be too extensive. It should include representatives from IT, finance, marketing and other groups within the organization to make sure that everything continues to perform effectively. From there, the deployment can scale up, taking into account the capabilities of the network. Automated endpoint and security tools should be able to automate these steps and verify safety every step of the way.<\/p>\n<p>\u201cMost endpoint and security tools don\u2019t include this kind of automation or compliance reporting about patch deployment and vulnerabilities remediated,\u201d said Leonard.<\/p>\n<h2 id=\"convergence\">Convergence is inevitable<\/h2>\n<p>Ongoing trends in IT and cybersecurity make convergence inevitable, Leonard said. The more tools you have, the more risk there is of errors and the greater the likelihood of cyberattackers finding a chink in the enterprise security armor. The more simplicity and automation that can be introduced, the lower the risk.<\/p>\n<p>Dave Gruber, an analyst at ESG, concurs.<\/p>\n<p>\u201cConvergence of endpoint management and security is an observable macrotrend,\u201d he said. \u201cThe better you can coordinate functions such as attack surface management, asset discovery, vulnerability assessment and vulnerability remediation, the easier it is to prevent malware from getting in and the simpler becomes the security job,\u201d he added.<\/p>\n<p><strong>Read next: <\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/downloads\/patch-management-plays-a-critical-role-in-layered-endpoint-cybersecurity\/\"><strong>Patch Management plays a critical role in layered endpoint cybersecurity<\/strong><\/a><\/p>\n<p> <!-- default newsletter at the end --> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a host of new challenges. Experts weighed in on the subject at the recent Syxsense Synergy event. Image: Adobe Stock\/ArtemisDiana Jump to: The Syxsense Synergy event last [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":93555,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40,788,783,287],"tags":[],"class_list":["post-93554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-cloud-security","category-cloudsync","category-security"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/93554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=93554"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/93554\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/93555"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=93554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=93554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=93554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}