Unified Endpoint Management (UEM) and IT Security: Critical Connections
UEM and cybersecurity are separate specialties within many enterprises and IT teams. However, these two important disciplines are inextricably intertwined. Herewith, some thoughts on those interdependencies and what they mean to your UEM and security management efforts.
Security Begins at Your Endpoints
The respected market watchers at Forrester Research perhaps said it best in The Forrester Wave™: Endpoint Security Suites, Q4 2016. “Endpoint security represents the frontline in your fight against cyberattackers. Breaches have become commonplace among enterprises, and your employee endpoints and servers are targeted more than any other type of asset.”
For its 2016 Global Business Technographics Security Survey, Forrester surveyed nearly 3,600 respondents from around the world. Those respondents all have “significant involvement in the planning, funding, and purchasing of business and technology products and services.” Forrester asked network security professionals at enterprises that had experienced a security breach in the 12 months preceding the survey, “Which of the following was targeted as a part of this external attack?” The top three responses:
- Corporate server (cited by 48 percent of respondents)
- Corporate-owned device (42 percent)
- Employee-owned device (40 percent)
Read the entire article here, Unified Endpoint Management (UEM) and IT Security: Critical Connections
via the fine folks at Ivanti.