Endpoint security tools moving beyond AV, putting a $10 billion market in play. Did you see the Palo Alto Networks announcement yesterday? If not, here’s my synopsis. PAN introduced a new endpoint security technology named “Traps” that is the ultimate result of the company’s acquisition of Cyvera this past March. In simple terms, Traps provides three core security functions:Advanced malware prevention. Traps is designed to deal with the most important attack vectors such as memory corruption, changes in registry settings, and malware persistency, with no prior knowledge about the malware itself.Endpoint forensics. Traps captures system-level activities to help security analyst understand what changes, if any, were made to compromised systems.Integration of network and endpoint security. Traps ties into PAN Wildfire and NGFW. This integration provides more holistic protection and gives analysts a vantage point across network and endpoint activities. The integration also ties Traps into Palo Alto threat intelligence.A few years ago, the endpoint security market was a cozy little oligopoly that was dominated by five vendors: Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. Others, like CA, Check Point, and even mighty Microsoft, couldn’t crack the code and either exited the market or minimized their product development, marketing, and sales. Fast forward to 2014 and things have changed. Network security vendors like Cisco (Sourcefire), FireEye, and PAN are jumping into the endpoint security pool. An army of others like Bit9, Bromium, Cylance, Digital Guardian (Verdasys), Guidance Software, IBM, Invincea, Malwarebytes, Raytheon, RSA and Triumfant are all offering some type of endpoint security technology. Why the change? For one thing, enterprises are being breached right and left and have no confidence in the efficacy of AV software alone. In fact, an ESG survey found that 62% of enterprise security professionals “strongly agree” or “agree” that AV software is ineffective at blocking all types of advanced malware (note: I am an ESG employee). From a vendor perspective, there are dollars available for new endpoint security technologies. ESG research also indicates that 51% of enterprise organizations plan to add new layers of endpoint security technology as part of their cybersecurity strategy over the next two years. PAN is not the only game in town but it may have a market advantage (along with its network security competitors): ESG research indicates that 61% of enterprise organizations are currently rolling out or planning a project to integrate network and endpoint security technologies. Since network security captures the majority of security brain power and resources at most enterprises, PAN and others are well positioned to flank the AV crowd with a full-frontal assault from the network to the endpoint. Like other “Endpoint Nuevo” vendors, PAN will not suggest that customers rip-and-replace traditional AV and substitute Traps – at least not for the time being. My guess is that this nice guy strategy won’t last, however. In the next 18 months, regulators will eschew AV requirements, replacing these with broader mandates for endpoint security. As this transition plays out, PAN and others will change their collective tune, suggest full replacements, and support this market strategy with security efficacy reports and ROI studies trumpeting AV replacement benefits. The endpoint security market is changing before our eyes which puts a $10 billion market in play. PAN’s announcement represents a bold intelligent move by the company and a sign of things to come in the marketplace. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe