SHARE
Facebook X Pinterest WhatsApp

Survey: Just 33 Percent of Companies Have Endpoint Security Plan

Device sprawl makes it challenges for businesses to secure endpoints.

Written By
thumbnail
Sue Walsh
Sue Walsh
Oct 11, 2016

Only 33 percent of respondents have strategies in place for endpoint security, but 51 percent said they are in the process of creating a strategy, according to a recent study by Tripwire.

In addition, 60 percent of those surveyed said they aren’t confident the IoT devices connected to their networks are getting timely security updates.

“Timely application of security updates is one of the most effective ways to reduce risk in any organization, but it remains a widespread challenge,” said Tim Erlin, senior director of IT security and risk strategy for Tripwire. “As more diverse devices are deployed, the availability and management of these updates becomes more difficult. Organizations need to have a strategy now, before an incident occurs.”

Endpoints are devices with which users interact, such as desktops, tablets or phones, and now include employee-owned devices, virtual machines, point-of-sale terminals, Internet of Things (IoT) devices and servers.

Tripwire’s findings were based on responses from 500 security professionals in their 2016 Security Challenge,   which was conducted with the help of Dimensional Research.

The survey also found that 21 percent of those surveyed said IoT security was their top concern, while a surprising 12 percent said they have banned IoT devices from their networks.

Close to one-third (31 percent) of those surveyed said they conduct comprehensive inventories of the IoT devices on their networks just once each year.

“The proliferation of devices from BYOD, IoT, and the incidental use of personal devices in the enterprise is causing ‘device sprawl,’ so it’s no surprise enterprises aren’t keeping up,” said Dwayne Melancon, Tripwire’s vice president of products.

“The key to dealing with this risk is to remember that foundational controls still apply, regardless of scale – know what’s on your network, understand how it’s vulnerable, keep it patched, keep it securely configured, and monitor the heck out of it for suspicious activity,” Melancon said.

Advertisement

Why IoT device security remains abysmal

Three ways the IoT can be hacked

How bad is IoT security? Very.

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
The Role of Data Governance in ERP Systems
Sandip Roy
Nov 28, 2025
What Is Sovereign AI? Why Nations Are Racing to Build Domestic AI Capabilities
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.