A new study shows that the sprawl of new management and security tools can end up leaving some endpoints unprotected. Credit: Gorodenkoff / Shutterstock Enterprises that use endpoint security and management technologies face a problem of growing marketplace “sprawl,” as new tools proliferate and options multiply, according to a study released today by the Enterprise Services Group.Between the ongoing influence of remote work and IoT, the number and diversity of devices that have to be managed by endpoint security tools is on the rise. As a consequence, the number of available tools to manage them has also risen.An ESG survey of 380 security professionals in North America, commissioned by cybersecurity company Syxsense, showed that companies using larger numbers of different tools to manage their endpoints had larger proportions of unmanaged endpoints, compared to those with fewer. Put simply, the complexity of the current-day device environment is leading to worse security, according to the research.Diversity of devices increaseDevice diversity, in particular, has increased sharply of late. While Windows PCs were still the most common devices under management, with 65% of survey respondents saying they were managing one or more such devices, IoT devices were the second-most common, at 61% for general purpose devices and 54% for specialized gadgets. Chromebooks, Android devices, and phones and tablets running iOS were also common devices under management. Overall, however, respondents said that the task of keeping their devices managed has gotten easier in the past two years. Over half — 56% — said that endpoint security is either “somewhat” or “much” easier to handle today as compared to two years ago, while 58% said the same about endpoint management.Roughly a third of organizations said that they had experienced multiple endpoint-related security incidents. Of those, 54% said that more than 20% of their overall endpoints were unmanaged, while 83% put that figure at between 11% and 20%. More unmanaged endpoints, in short, appear to lead to a greater likelihood of a cyberattack. Implementing dedicated endpoint protection solutions has a correspondingly positive effect on security, as 44% of respondents said that they discovered unsecured systems when putting such products into production, and 40% said that they found sensitive data in places where it should not be.The biggest individual challenges in endpoint management, according to ESG’s data, center on patch management. Over a third — or 34% — of respondents said that a major challenge in this area was aligning IT and security priorities for patching, while a similar number said that tracking specific vulnerabilities and patch management were the most serious issue. Unpatchable vulnerabilities were rated as highly difficult by 31%, while automating the endpoint management workflow was cited by 30%. Related content news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware news Okta confirms recent hack affected all customers within the affected system Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident. By Shweta Sharma Nov 30, 2023 3 mins Data Breach Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe