iTnews

Second tier vendors to challenge McAfee, Symantec on endpoint security

By Richard Thurston on Jun 6, 2008 10:22AM

AVG, BitDefender, Kaspersky and Sophos are making inroads into the market share of the endpoint industry leaders, largely on the grounds of using less processing power, a leading analyst argued today

A new breed of security vendor is set to challenge McAfee and Symantec over endpoint security, according to a leading security analyst.

Nick Selby, research director for analyst firm The 451 Group, said the processing requirements of McAfee's and Symantec's products had become huge, and that considerable numbers of businesses had switched to second tier vendors.

Those second tier vendors - of which Selby named AVG, BitDefender, Kaspersky and Sophos - were becoming popular because of their lower processing requirements.

"We are seeing the rise of a second tier of architecture vendors which are giving a hard time to the Symantecs and McAfees," said Selby.

"Endpoint security is entering a new phase of craziness. People have been putting so many clients on endpoints, and 90% of the CPU has been going through signatures. Some of these smaller guys are taking up less processing power."

Selby illustrated his point with a reference to General Electric, which swapped out Symantec for Sophos on thousands of desktops.

"They said the service is better," said Selby, who was speaking at his company's Enterprise Computing Strategies Summit in London today. "It wasn't just about the cost per seat."

Selby also outlined the difficulties businesses face in identifying the perimeter to their network. "Every endpoint that could leave the building, and indeed every endpoint in the building, is a great threat."

He described the concept that everything within the enterprise is safe as "quaint" and said that theory would only hold in "the most staid or small enterprise."

Speaking at the same conference, the director for IT R&D at banking giant Credit Suisse warned enterprises to pay more attention to application vulnerabilities.

"Network-centric defences are last year's war," argued Chris Swan. "80% of vulnerabilities are in applications, not in infrastructure, but we're spending 80% of our money on what's happening in the network."

He added: "Most of it [application vulnerabilities] are [due to] naive errors, rather than malice."


See original article on scmagazineus.com
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
challengeendpointmcafeeonsecondsecuritysymantectiertovendors

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Teaching tech teams every step of implementing a machine learning project
Promoted Content Teaching tech teams every step of implementing a machine learning project
Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Richard Thurston
Jun 6 2008
10:22AM
0 Comments

Related Articles

  • US warns of newly found advanced Chinese backdoor
  • White House to tackle cyber challenges with Apple, IBM, insurance CEOs
  • EU governments, lawmakers agree on tougher cyber security rules for key sectors
  • Gov pledges to mandate IoT cyber security standards
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.