Dramatic Changes Coming in Endpoint Security
NEW YORK (TheStreet) -- Current models of endpoint security are becoming outmoded as a more diverse set of mobile and Internet-connected devices become a larger share of the market. The endpoint protection market will change dramatically in the next 3-4 years, with major implications for end users, businesses and the security vendors. Will the vendors be able to change and the end users adapt to the new requirements?
There is a significant change coming to endpoint security, with dramatic implications for how end users will be protected and what security companies must do to remain relevant and competitive. In fact, within 3-4 years, I expect endpoint security to change so much that it will hardly resemble the architecture we currently have in place. The changes will be mostly transparent to users, but will increase their level of protection, extend the umbrella across a much wider array of devices, and protect against a changing threat environment. So what will change?
First, â¿¿thickâ¿ clients (like current AV and Firewall SW suites) will be slimmed down dramatically, as a result of new platforms that are exposed but not as rich a target as current PCs (e.g., smart phones, tablets, Internet devices). Further, the â¿¿thick clientâ¿ model is mostly broken, as security companies (e.g., McAfee (MFE), Symantec (SYMC), Trend Micro) are finding it increasingly difficult to keep up with an expanding array of malware threats without seriously impacting device performance.
Second, much of the defensive posture will move to the networks and the cloud, where most data delivered to end user devices will originate and where it will be scanned and secured. This means a good deal of the security footprint will be behind the scenes and often invisible to the end user, and with little device impact. Some security SW will remain loaded on the device, but its imprint will be substantially diminished and will provide only basic services.Third, the network will become much more malware aware than it currently is, and include advanced threat detection based on packet sniffing, smart analysis of traffic, etc. Current network topology is basically designed as a server of bits, with no attempt to detect and correct threats. This posture will change to be much more proactive, particularly as more cloud based services are employed (this will be driven home the first time a major cloud-based service provider is sued over a malware incident causing damage to a customer). Network-based security will become a key component from infrastructure vendors (e.g., Cisco (CSCO)).
Select the service that is right for you!COMPARE ALL SERVICES
Jim Cramer and Stephanie Link actively manage a real portfolio and reveal their money management tactics while giving advanced notice before every trade.
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
- Weekly roundups
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Upgrade/downgrade alerts
Jim Cramer's protege, David Peltier, identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.
- Diversified model portfolio of dividend stocks
- Alerts when market news affect the portfolio
- Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
All of Real Money, plus 15 more of Wall Street's sharpest minds delivering actionable trading ideas, a comprehensive look at the market, and fundamental and technical analysis.
- Real Money + Doug Kass Plus 15 more Wall Street Pros
- Intraday commentary & news
- Ultra-actionable trading ideas
Our options trading pros provide daily market commentary and over 100 monthly option trading ideas and strategies to help you become a well-seasoned trader.
- 100+ monthly options trading ideas
- Actionable options commentary & news
- Real-time trading community
- Options TV