Endpoint security is a policy-based client/server security approach to protect enterprise network when accessed via endpoint devices, such as smartphones, tablets, desktops, laptops, and other remote devices. A centrally managed server hosts the security program and the client program in installed on each endpoint devices. The endpoint security solution monitors the activities on connected devices to identify intrusions or threats and mitigate the potential risks.
The vendors have been placed into 4 categories based on their performance in each criterion: visionary leaders, innovators, emerging, and dynamic.
The visionary leaders receive high scores for most of the evaluation criteria. They have an established product portfolio and a very strong market presence.
Innovators have innovative portfolio of services and a strong potential to build robust business strategies for their business growth, to be at par with the Vanguards. Moreover, a strong and dedicated direct and indirect sales channel is one of the key factors influencing the brand position of the firm.
The dynamic differentiators are established vendors with very strong business strategies. However, they have a low product portfolio. They focus on a specific type of technology related to the product.
The emerging companies have niche product offerings and are starting to gain their position in the market. They do not have much strong business strategies as compared to other established vendors. They might be new entrants in the market and require some more time before getting significant traction in the market.
Endpoint Security Solutions Covered in the Analysis
Endpoint security includes a variety of solutions, such as anti-virus, anti-spyware/anti-malware, firewall, endpoint device control, intrusion prevention, and endpoint application control. These solutions enable enterprises to protect their endpoints from any type of malware attacks which may significantly affect the working of the enterprise.
Anti-virus software solutions help in the prevention, detection, and removal of malwares such as computer viruses, rootkits, spywares, malwares, Trojans, and worms from endpoint devices and acts as a shield between endpoints and these threats. Anti-virus packages catering to the needs of SMBs are reducing the cost of security for these businesses. In the consumer segment, there have been new entrants that are creating competition among product offerings and prices. There is also an emerging trend of launching packaged solutions that provide security on multiple platforms. Companies such as Symantec, Sophos, and Intel Security have launched endpoint security solutions on multiple platforms to enable users to safely use internet on any device of their choice. In 2014, around 40% of the world population was using internet. This high usage of internet among the population is pushing companies to enter newer markets and has raised data security concerns.
Spyware tracks and gathers information about the user’s activities on a computer. This leads to theft of personal information, which can be hazardous. Malwares disrupt processes in a computer system and cause damage to the data stored in the server. They are classified according to their behavior and potential risks associated with them. Anti-spyware and anti-malware have important presence in the market due to the increased threat of security breach. Anti-malware software are not limited to computers, and they are being developed for other platforms as well, such as laptops and tablets. Another growth factor in this market is the rapid adoption of cloud and internet services in small businesses.
Firewalls protect an enterprise network. They keep a track of all the incoming files into an enterprise network and check them for any type of virus, malware that may be present. Firewall also ensures that all the files being viewed or downloaded by the users are according to the IT policy of the company. In addition to these, firewalls can be configured so that the end users cannot download any malicious files from the internet.
ENDPOINT DEVICE CONTROL
Endpoint device control solutions are primarily used by enterprises to control the data that may get transferred from the enterprise through any removable media, such as hard drives, USBs, and Ipods. Endpoint device control tools enable monitoring of data that gets transferred to laptops or any other hard drives even when the device is not connected to the enterprise network. Enterprises are fast deploying these solutions enable the enterprises to keep a check on who can access what data and to what extent.
Intrusion prevention solutions differ from anti-spyware/anti-malware solutions in the aspect that these intrusion prevention solutions prevent malicious files to reach to your device. The demand for Intrusion prevention solutions is on the rise as these solutions enable enterprises to detect advanced persistent threats before they can reach any hard drive and compromise the content stored in it.
ENDPOINT APPLICATION CONTROL
With the rising sophisticated cyber-attacks, enterprises are looking for security solutions that are not only able to detect these attacks but are also capable of mitigating them. Endpoint applications solutions ensure that the unknown and unwanted applications cannotrun on endpoint solutions. These solutions ensure that the applications which follow all the necessary IT regulations, such as the Federal Information Security Management Act (FISMA) and Health Insurance Portability and Accountability Act of 1996 (HIPAA) of the enterprise are executed and prevents others applications to get access to any enterprise network.
Frequently Asked Questions
Financial PerformanceTotal revenue for the last FY? | Percentage Increase | Number of End Point Security Customers | Average Customer Retention Rate YoY | Total revenue for the last FY | No. of End Point Security customers | % increase in revenue YoY for last FY | Average customer retention rate YoY |
GeographiesUSA | Canada | Latin America | UK | Germany | Eastern Europe | Western Europe | Africa | UAE & Middle East | Israel | India & South Asia | China & HK | SEA & Singapore | Japan | Australia & New Zealand |
Channel Strategy and Fit
Source of Sales by percentage of contributionDirect | Distributors / VARs / OEMs | Agencies & Consultants | Managed Service Providers | System Integrators / Budlers |
Channels of DemandWeb Search | Digital Marketing | Field Sales | Events |
Breadth of Applications Served
IndustriesConstruction | Consumer & Commercial | Education | Energy and Utilities | Financial Services | Government | Healthcare | Industrial Control Systems | Manufacturing | Media & Communications | Military & Aerospace | Retail | Transportation |
Product Quality and Reliability
Deployment TypeWeb-Based | Installed | iOS | Android |
Deployment ModelOn-Premises | Cloud | Hybrid |
Product Features and Functionality
RespondAutomated Malware Removal | Synchronized Security Heartbeat | Root Cause Analysis | Block targeted attacks |
PreventionWeb Security | Web Control / Category-based URL Blocking | Peripheral Control (e.g. USB) | Application Control | Client Firewal | Deep Learning malware detection | Anti-Malware File Scanning | Live Protection | Pre-execution Behavior Analysis (HIPS) | Potentially Unwanted Application (PUA) Blocking | Stop fileless attacks | Prevent data breaches | Exploit Prevention |
LicensingBusiness | Enterprise |
DetectionRuntime Behavior Analysis (HIPS) | Malicious Traffic Detection (MTD) | Active Adversary Mitigations | Ransomware File Protection (CryptoGuard) | Disk and Boot Record Protection (WipeGuard) | Man-in-the-Browser Protection (Safe Browsing) |
Data SecuritySegregation of Network | Encryption of Data | Prevent Data Loss | Control File Integrity | Monitor the Data access |
Costs & Units$ per Month/Yearly | $ per license |
Breadth and Depth of Product Offering
Use CasesInsider Threat | Enterprise-wide Monitoring | Incident Response | Threat Hunting |
ServicesTechnical Support | Virus & Threat Help | Renewals & Registration | Education & Certification | Free Downloads | Free Clean-up Tools |