Cloud Addresses Endpoint Security & Performance Issues

The 24x365 connected world is fueled by people and devices, but even as businesses become more dependent upon online assets, security threats and performance issues can disrupt and even destroy those assets


The 24x365 connected world is fueled by people and devices, but even as businesses become more dependent upon online assets, security threats and performance issues can disrupt and even destroy those assets. Trying to shoehorn all the latest and greatest protection on every device is both challenging, and ultimately futile, because the more security safeguards are added, the more performance suffers, and the more frustrated and unhappy users become. With the cybersecurity threatscape changing daily, the best solution for addressing endpoint protection with the best possible performance is cloud-based, according to Neustar, a provider of network management and security solutions with over 19 years of experience.

Cybersecurity is a growing concern, and while overall IT spending is barely increasing, cybsec budgets are growing at 11% per year, and will almost double from $137.85 billion in 2017 to $231.94 billion by 2022. Endpoint security is growing slightly faster -- 11.2% compound annual growth -- from $11.9 billion to $27.8 billion by 2025, driven by growing adoption of the cloud and increasing demand for Software as a Service (SaaS) business models. And cloud-based security services are soaring, up 21% year-over-year in 2017, and heading towards $9 billion by 2020.

The reasons for this surging focus on security are many, but the explosive growth of the number of devices and threats are top contributors. In 1999 just 4% of the world’s population was online,

but today that number is 49%, with more than 8 billion connected things in use worldwide.

While PC shipments, including notebooks, reached 60.5 million units in the second quarter of 2017, mobility is already valued at more than $1.5 trillion in annual sales.

However, the very things that make the connected world possible, devices and cloud, also make it more vulnerable. The AV-TEST Institute registers over 390,000 new malicious programs every day, and the number of new malware specimen is expected to reach more than 7.4 million this year. The average cost of a data breach has risen to $4 million, and it averages between 175 to 227 days to identify a breach, and 52 to 88 days to contain that breach.

Cloud-based endpoint protection management is one of the fastest-growing segments, especially for small and midsize businesses, notes Gartner research director Ruggero Contu. "The cloud medium is a natural fit for the needs of SMBs. Its ease of deployment and management, pay-as-you-consume pricing and simplified features make this delivery model attractive for organizations that lack staffing resources," he said.

“SMBs are suffering from endpoint agent fatigue,” saidChris Roosenraad, Director of Product Management at Neustar.

. “They’re looking for easy ways to apply policies and protect as many devices as possible, as quickly as possible.”

A cloud-based security solution like Neustar’s UltraRecursive offering provide a number of benefits, including the ability:

-to protect users connecting from many locations and multiple devices;

-to minimize exposure to malware, viruses, phishing scams and other cyber threats;

-to easily create and implement policies to control access to unwanted or unauthorized content; 

-to ensure availability and delivery of critical business applications with minimal performance degradation or ongoing management requirements; 

-to eliminate single points of failure, the possibility of bottlenecked queries or provider threshold limitations; and,

-to provide optimal security and functionality, without contributing to endpoint security fatigue.

Using a cloud-based security solution such as UltraRecursive, together with a mobile device management capability, can protect every device and location within hours, with no compatibility issues or performance impact on users. An easily customizable architecture ensures an optimal user experience, with custom web filtering, content blocking, white/black lists, and is API enabled to ensure compliance with organization or regulatory requirements.


Copyright © 2017 IDG Communications, Inc.