Enterprise organizations want new endpoint security tools that are better at preventing exploits and malware and streamline operations. Credit: Thinkstock As we ease into 2018, endpoint security technology is in play.Next-generation players such as Barkly, Cylance and SentinelOne offer products based on machine learning algorithms to block traditional and new types of threats. EDR experts such as Carbon Black, CrowdStrike and Cybereason monitor PC behavior, looking for anomalous activity. Meanwhile, traditional vendors such as McAfee, Sophos, Symantec, Trend Micro and Webroot are buying companies and adding new functionality to their products to provide a one-stop endpoint security shop.Yup, everyone is intent on providing the whole endpoint security enchilada, and based upon ESG research, large organizations are also moving in this direction — 87 percent of enterprises say they will buy a comprehensive endpoint security suite to address new requirements.What cybersecurity professionals want in an endpoint security toolBeyond the move to suites, what are organizations really looking for with new types of endpoint security technologies? ESG recently asked this question to 385 cybersecurity professionals. Here’s what they said: 26 percent say the most important consideration for endpoint security technology is to increase the efficacy when dealing with new types of threats. In other words, they want tools that can detect and block a higher percentage of overall known and unknown exploits and malware. 26 percent say the most important consideration for endpoint security technology is to improve operational efficiency for end users, IT and the security team. That means endpoint security technology must be much easier to deploy, configure, operate, analyze and use on a day-to-day basis. Allow me to provide a bit of analysis to this data:The move toward new technologies suggests that many endpoint security tools are not blocking enough exploits and malware. This not only leads to compromised systems, but it also creates a lot of security/IT operations work, such as detecting security incidents, quarantining devices and reimaging systems.These endpoint security processes exacerbate a more fundamental problem — there’s more security work than there are people to do the work. Oh, and the skills shortage is making this situation progressively worse.Yes, end users should be encouraged to participate in strong security hygiene, but we can’t expect them to put up with security tools that disrupt their productivity.CISOs have had enough. They need new types of security tools (in this case, endpoint security suites) that increase the number of blocked threats and decrease the amount of work necessary to do so — for all involved parties. My colleague Doug Cahill has captured this analysis extremely succinctly. According to Doug, large organizations are looking for endpoint security suites that offer, “efficient efficacy.” In this way, they promote better security while streamlining operations, making security a bit less burdensome all around. I couldn’t say it better myself. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe