版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
TheGrowingRoleofAI
inEndpointManagementandSecurityConvergence
GabeKnuth|SeniorAnalyst
ENTERPRISESTRATEGYGROUP
ApRiL2025
©2025TechTarget丿lnc.AllRightsReserved.
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence
ResearchObjectives
Organizationscontinuetofaceincreasingcomplexityinendpointmanagementandsecuritythatisdrivenbytherapidexpansionofremotework,risingdeviceandOSsprawl,vulnerabilitymanagementandincidentresponsechallenges,andcontinuingthreatslikeransomware.Atthesametime,thegrowinginfluenceofAIandautomationisreshapingbothoffensiveanddefensive
strategies—empoweringdefenderswithnewtoolswhileenablingbadactorstolaunchmoresophisticatedattacks.
Togainfurtherinsightintothesetrends,howorganizationsareattemptingtoovercomechallenges,andtheresultsoftheirefforts,EnterpriseStrategyGroup,nowpartofOmdia,surveyed364ITandcybersecurityprofessionalsinNorthAmerica
(USandCanada)responsibleforevaluating,purchasing,andsupportingendpointmanagementand/orsecuritytechnologies.
Thisstudysoughtto:
Assessthestateofendpointmanagementandsecurityaswellasthechallengesandprioritiesthatdrive
decision-making.
Comparetheresultsofthisresearchtosimilarresearchfrom2022,andrevealtrendsintheconvergenceofITandsecurityteams,devicesinuse,andexperiencedsecurityevents.
Understandtheshiftingtrendsinbuyingteamsasconvergencetakesholdaswellasfutureprioritiesandlikelyspendingintentions.
Highlightemergingtrends,threats,andsolutionsbroughtaboutbyanevolvingmarketthatisincreasinglycontendingwiththebenefitsanddangersofAI.
©2025TechTarget丿lnc.AllRightsReserved.
2
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence3
KeyFindings
OrganizationsFace
IncreasingDeviceDiversity
andManagementComplexity
PAGE4
PAGE16PAGE20PAGE23
SecurityAwarenessandEfficacyAreAffectedbyConsolidationMaturityandSkillGaps
ManagementandSecurityTool
SprawlPersistsAmidChangingToolandTeamConsolidationEfforts
PAGE9
AIandAutonomousEndpoint
ManagementShowOverwhelminglyPositiveInitialImpacts
MostUnmanagedDevicesAreNotUnmanagedbyChoice
PAGE13
StrategicInvestmentsinTechnologyandServicesAreKeytoSuccess
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
OrganizationsFace
IncreasingDeviceDiversityandManagementComplexity
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence5
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
EndpointManagementandSecurityAreBecomingMoreDifficult
Mostorganizationsaremanagingthousands—andinmanycases,tensofthousands—ofendpointdevices.Nearlythree-quarters(72%)oforganizationsreporthavingatleast1,000devicesinplay,spanninglaptops,mobiledevices,andmore.Thislevelofdevicesprawl,especiallyacrossbothmanagedandunmanagedassets,underpinstheoperationalchallengesteamsfaceastheytrytomaintainvisibility,enforcepolicies,andrespondtothreatsinrealtime.Compoundingthechallenge,employeesareusingmultipledevicestogettheirworkdone.Infact,93%oforganizationssaythetypicalemployeeusestwoormoreendpointsdaily.Thatincludeslaptops,smartphones,tablets,andotherdevices,allofwhichneedtobesecured,patched,andmonitored.
Thislevelofper-usersprawlputsadditionalpressureonITandsecurityteamsalreadystretchedthinbygrowingdevicecountsandlimitedvisibilityacrossenvironments.Becauseofthis,roughly40%ofrespondentsnotedthatendpointmanagementand/orsecurityarenowmoredifficultcomparedwithtwoyearsago.
Totalendpointdevicesinuse.
45%
27%
27%
1,000to9,999endpointdevices
10,000ormoreendpoint
devices
Fewerthan1,000endpoint
devices
Averageendpointdevicesperemployee.
35%
29%
6%
13%
8%
10%
12345Morethan5
Changeindifficultyofendpointmanagementandsecurity.
15%15%
10%
9%
Muchmoredifficult
todaythanitwastwo
yearsago
Somewhatmore
difficulttodaythanitwastwoyearsago
Nomoredifficultor
easytodaythanitwas
twoyearsago
Somewhateasier
todaythanitwastwo
yearsago
Mucheasiertoday
thanitwastwoyears
ago
EndpointsecurityEndpointmanagement
25%
21%
32%
29%
22%22%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence6
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
TheCoreDriversBehindRisingComplexityinEndpointManagementandSecurityCanBeSummedUpinTwoWords:MoreandLess
Organizationsaredealingwithmorethreats,morefrequentOSandapplicationupdates,moredevices(bothmanagedandunmanaged),andmoreremoteorhybridworkers.Thegrowingdiversityofoperatingsystems,applications,anduserneedsonlyaddstothechallengeofmanagingandsecuringtheseworkspaces.
Ifthere’sathemearoundwhatorganizationshavelessofwhenitcomestomanagingandsecuringdevices,itincludestime,expertise,andvisibility.Respondentspointtoalackof
skilledstaff,insufficienttraining,andlimitedtimetolearnoroptimizenewtoolsascontributingfactors—highlightingagrowingresourcegapatatimewhendemandscontinuetorise.
Shortageofskilledpersonnelwithendpointmanagementknowledgeorexperience
_____________________.
30%
Thenumberandfrequencyof
applicationupdatesorpatches
hasincreased
_____________________.
26%
Topfactorsdrivingincreasedendpointmanagementcomplexity.
Thenumberand
frequencyofOSupdatesorpatcheshasincreased_____________________.
37%
Thenumberofmanageddeviceshasincreased
_____________________.
36%
Wesupportmore
remoteand/orhybrid
workerstoday
_____________________.
36%
Employeesuseanassortmentofdevices,OSes,and
applicationstodotheirjob_____________________.
32%
Difficultyprovidingsecureaccesstothird-party
resources
____________________.
29%
Complexityofregulatory
compliancerequirements
_____________________.
28%
Thenumberof
unmanageddevices
hasincreased
_____________________.
26%
Increasedaccesstoanduse
ofbrowser-basedorSaaS
applications
_____________________.
26%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence7
Employeesuseanassortmentofdevices,OSes,and
applicationstodotheirjobs_____________________.
32%
Enduserslacktheright
securitytraining
_____________________.
27%
Topfactorsdrivingincreasedendpointsecuritycomplexity.
Thethreatlandscapehasgrownmorecomplex
_____________________.
40%
IncreaseduseofAIbythebusinessorendusers
_____________________.
40%
Thenumberofmanageddeviceshasincreased
_____________________.
36%
Wesupportmoreremoteand/orhybridworkerstoday
_____________________.
36%
Thenumberofendpoint
vulnerabilitieshasincreased_____________________.
31%
Thenumberofunmanageddeviceshasincreased
_____________________.
30%
Complexityofregulatory
compliancerequirements
____________________.
29%
Increasedaccesstoanduse
ofbrowser-basedorSaaS
applications
_____________________.
28%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence8
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
SkillGapsandAIThreatentoMakeEndpointMattersWorse
Whilemanyorganizationsunderstandablystruggletosupportnewtechnologieswithadequatelyknowledgeableandexperiencedstaff,asignificantportionnotedheadcountgapsinbothnewerareaslikeAI/MLandcloudsecurityandtraditionalendpointmanagement,aswellasautomationandworkflowdevelopmentandIoTdevicemanagement.PerhapsmostconcerningisthatAIisenablingbadactorstotakeadvantageoftheverygapsinskillfromwhichorganizationssufferacrossavarietyofareas,inadditiontoageneralincreaseinboththequantityandsophisticationofattacks.
This,aswillbeseenlater,hasadirectinfluenceonanorganization’sabilitytomanageandprotectitself,letaloneknowwhetheritisunderattack.
Topskillgapareasforendpointmanagementandsecurity.
46%
AIandmachinelearningimplementationandoperations
38%
CloudandSaaSsecurity
32%
Modernendpointsecuritytoolsandtechnologies
31%
30%
TraditionalendpointmanagementskillsAutomationandworkflowdevelopment
30%
IoT/OTdevicemanagement
TopwaysAIisusedbyattackerstargetingend-userdevices.
41%
Increasedquantityandsophisticationofphishingandsocialengineeringattacks
37%
DevelopingAI-drivenbotsorwormsforautomatedlateralmovement
37%
Developingmalwareorransomwarethatishardertodetectoranalyze
35%
Increasingthevolumeofattacksoverall
34%
Increasingthescaleofattacksoverall
34%
Increasingthespeedoragilityofattacksoverall
ManagementandSecurityTool
SprawlPersistsAmidChangingToolandTeamConsolidationEfforts
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence10
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
ToolSprawlIsRealandDrivenbyNumerousFactors
Mostorganizationsarejugglingmultipletoolsforbothendpointmanagementandsecurity,withthemajorityusingbetweenfiveand15toolsineachcategory.Nearly30%saythey’remanaging16ormoretoolsforendpointsecurityalone.Whilerespondentswereasked
separatelyabouttheirmanagementandsecuritytools,it’slikelythatsometoolsspanbothfunctions.Still,theoveralltakeawayisclear:Teamsaresupportingalargenumberoftools,whichcanaddfriction,increasecost,andcomplicateintegration.Thefactthat21%reportusingfewerthanfivetoolsforeachcategoryhintsatsomeconsolidation—butformost,
there’sstillalongwaytogo.
Themostcommonfactorsdrivingsprawlacrossendpointsecurityandmanagementtoolsincluderequirementsspanningcustomersecurity,cyberinsurance,andindustrycompliance,aswellasspecializedtoolsforIoT/OT.
Numberofendpointmanagementandsecuritytoolsdeployed.
37%
29%
21%21%21%20%
Fewerthan55to1011to15
18%
12%11%
9%
1%1%
16to20Morethan20Don’tknow
EndpointmanagementEndpointsecurity
Toptenfactorscontributingtomanagementandsecuritytoolsprawl.
Customersecurityrequirements
Cyberinsurancerequirements
Industrycompliancerequirements
IoT/OTrequiringspecializedtools
Toolsrequiredbyimmediatecomplianceneeds
Cloudadoptionrequiringadditionaltools
Quickoremergencydeploymentsthatbecamepermanentsolutions
Legacytoolsmaintainedalongsidenewsolutions
Vendor-orpartner-mandatedtools
SeparatetoolsneededfordifferentOSordevicetypes
Respondingtospecificsecurityincidents
41%
37%
36%
36%
35%
35%
34%
33%
32%
30%
30%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence11
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
ToolConsolidationSeenasaPositive
Eightintenorganizationsbelievethatconsolidatingendpointmanagementandsecuritytoolswouldpositivelyimpacttheirabilitytomanageandsecureendpoints,whichisapositionthatisreinforcedthroughoutthisresearch.Furthermore,50%ofrespondentsbelievethatoverlappingtoolfunctionalitiesnegativelyimpacttheirorganization’sabilitytosecureand
manageendpoints.
It’snosurprise,then,toseethattheprimaryapproachtoconsolidationtakenbyorganizationsistoconsolidateendpointmanagementandsecurityvendors,followedbyobservabilityandmonitoringtechnologies.
Toolconsolidationandfunctionaloverlapavoidancearetopofmind.
Consolidatingtoolsusedforendpoint
managementandsecuritywould
positivelyimpactourabilitytomanage
andsecureendpoints.
StronglyagreeAgree
40%
40%
Overlappingfunctionalityacrosstoolscausesproblemsthatnegativelyimpactendpointmanagementandsecurity.
StronglyagreeAgree
17%
33%
亻●
Actionstakentosupportendpointmanagementandsecurityconsolidation.
48%
Consolidateendpointmanagementandsecurityvendors
42%
Consolidateorintegrateobservabilityandsecurity
40%
39%
monitoringtechnologies LeverageAI-drivenautomationfromvendorsConsolidatedesktoporapplicationvirtualizationmanagementteamsandworkflows
36%
36%
35%
34%
33%
Engagewiththird-partyservices
PurchaseordeployUEMtechnologiesthat supportPCs,Macs,andmobiledevicesPurchaseordeploytoolsthatprovidefunctionality forbothvulnerabilityandpatchmanagementEstablishanendpointassetmanagementsystemasasinglesourceoftruth
IntegratedisparatetoolsthroughAPIs
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence12
Haveorganizationsconsolidatedteamsmanagingendpointmanagementandsecurityfunctions?
TeamConsolidationEffortsSeemtoHaveStalled
oneteamthatownsbothendpointYes,
Yes,completely(i.e.,thereisnow
Thoughtoolconsolidationistopofmind,momentumtowardoverallmanagementandsecuritymanagementandsecurity)toalimitedextent
teamconsolidationhasslowed.Whileit’sstillapriority,drivenbythedesiretoimproveoperationalefficiencyandcoordinationaswellassecurityresponsetimesandeffectiveness,thepercentageofrespondentsthatidentifyashavingcompletelyconsolidatedtheirteamsintoonehasfallen
from55%to43%overthepasttwoyears.
36%Likewise,thereisadrop-offinconsolidationaspirationsamongorganizationsthathavenotyet43%
completelyintegratedthepersonnelsupportingendpointmanagementandsecurityfunctions.55%
Specifically,thenumberoftheseorganizationsthatanticipatefullycombiningmanagementand39%
securityeffortsunderoneteamhasdroppedfrom58%in2023to44%in2025.
Forthosethathaveconsolidatedorexpectto,mostoftentheresultingteambecomespartofIT
operationsasopposedtosecurityoperations,whichcouldexplainwhysomesaytherewillalways2023202520232025
besomeproceduresthatwillbeownedbyotherteams.
AreorganizationsplanningtoconsolidateteamsmanagingendpointTeamthatownstheconsolidatedendpointmanagement
managementandsecurityfunctions?andsecurityfunction.
17%
22%60%
1%
IToperations
Security
Anewgroupcombiningbothdisciplines
Don'tknow
58%
44%46%
36%
5%
YesMaybe,buttooearlytotellNo,therewillalwaysbeprocessesand
proceduresthatshouldbeownedand
managedbydifferentendpointteams
20232025
10%
MostUnmanagedDevicesAreNotUnmanagedbyChoice
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence14
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
EndpointDeviceManagementIsaMixedBagWithSimilarlyMixedResults
Respondentsindicatedanaverageof68%oftheirorganization’sdevicesarecentrallymanagedbyITorsomethird-partyprovider.Therealstory,however,isintheunmanageddevices.Typically,unmanageddevicesfallintotwocategories:“strategically
unmanaged,”wherebysecurityisensuredviaalternativemeanslikezero-truststrategies,VPNs,browsersecurity,ordesktop
virtualization,and“unintentionallyunmanaged,”wherebydevicesgounmanagednotbecauseofastrategy,butduetooversight,
lackofvisibility,orcapabilitygaps.Theresearchshowsthat59%ofunmanageddevicesbelongtothelattercategory,whichmeansthatnearlyoneinfivedevicesinagivenorganizationarebothunmanagedandunsecured.
Percentageoftotaldevicesthatarecentrallymanaged.
23%
14%
15%13%
12%
8%
7%
1%
3%
4%
10%or
less
11%to
20%
21%to
30%
31%to
40%
41%to
50%
51%to
60%
61%to
70%
71%to
80%
81%to
90%
91%to
100%
Percentageofunmanageddevicesthatarestrategicallyunmanaged.
18%
12%
11%
10%
9%
8%
7%
6%6%
10%
10%or
less
11%to
20%
21%to
30%
31%to
40%
41%to
50%
51%to
60%
61%to
70%
71%to
80%
81%to
90%
91%to
100%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence15
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
Visibility,Access,andComplexityToptheListofReasonsDevicesGoUnmanaged
Whenaskedaboutwhythesedevicesgounintentionallyunmanaged,organizationsindicatedconcerningtechnicalandvisibilitylimitations,alongwithothercommonchallengesrelatedtocomplexity,moredevices,andresourceconstraints.
Giventheoverallconfidenceintheirabilities,thispaintsaparadoxicalpicturethatwouldindicatethatoperationsmaynotbeasrobustastheyseem.Asisillustratedinthenextsection,thiscanresultincriticaloversights.
Topfactorsthatleadtounintentionallyunmanageddevices.
Limitedvisibilityintodeviceexistenceorlocation
_____________________.
41%
Rapiddeviceproliferationoutpacingmanagementcapabilities
____________________.
34%
Technicallimitations
preventingmanagement
_____________________.
40%
Resourceconstraints
_____________________.
32%
Third-partyorcontractor
deviceswithrestrictedaccess
____________________.
39%
Insufficienttoolsorcapabilitiestomanagethesedevices
_____________________.
30%
Complexorlegacysystemsthatresiststandardmanagementapproaches
____________________.
39%
Organizationalsilosorunclearownership
_____________________.
27%
SecurityAwarenessandEfficacyAreAffectedbyConsolidationMaturityandSkillGaps
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence17
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
PoorDeviceManagementContinuestoFuelCyberattacks,butFewerAttacksAreReported
Asignificantnumberoforganizationsexperiencecyberattacksduetounknown,unmanaged,orpoorlymanagedendpoints;however,thenumberofrespondentswhoansweredintheaffirmativeonthisisdownsignificantly.Specifically,morethanthree-quarters(77%)saidtheyhadin2023versusjustmorethanhalf(54%)in2025.
Howcanthesituationbegettingmoredifficult,withsomanyskillgapsandunintentionallyunmanageddevices,yetweseereducedcyberattacks?Theansweris,forbetterandworse:awareness.
Haveorganizationsexperiencedcyberattacksrelatedtounknown,unmanaged,orpoorlymanageddevices?
22%
15%
10%
8%
1%0%
Yes,severaltimesYes,onceMaybe,butwedon’thaveenoughNoDon'tknow
informationtoknowforsure
36%
34%
32%
20232025
43%
TheGrowingRoleofAlinEndpointManagementandSecurityConvergence18
©2025TechTarget丿lnc.AllRightsReserved.Backtocontents
Awareness(andLackThereof)ContributestoaPerceived
ReductioninSecurityEvents
Whenlookingatthoseorganizationsthathad
reportedcyberattacksthroughthelensofthe
degreeofendpointmanagementandsecuritypersonnelconsolidationtheyreportedhaving
completed,itshowsaclearconnectionbetweenconsolidationandgreaterawarenessofthe
securityeventsthathaveoccurred.Inessence,consolidatedteamsseemoreeventsbecausetheyarebetteratfindingthem,whereasgroupsthatarenotconsolidatedarenotasgoodat
identifyingthoseeventsandaremorelikelytosaytheyhaven’texperiencedany.
Frequencyofcyberattackdetectionbasedonextentofendpointmanagementandsecuritypersonnelconsolidation.
We'veexperiencedseveralcyberattackscausedbytheexploitofanunknown,unmanaged,orpoorlymanagedendpointWe'veexperiencedonecyberattackcausedbytheexploitofanunknown,unmanaged,orpoorlymanagedendpoint
35%
23%
Wehavecompletelyconsolidatedtheteamsorindividualsresponsibleforendpointmanagementandendpointsecurity(i.e.,thereisnowoneteamthatownsbothendpointmanagementandsecurity)
13%
45%
Wehaveconsolidatedtheteamsorindividualsresponsible
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- AI在移动商务中的应用
- 2026年英语单词记忆游戏教学设计
- 2026年心脑血管病体检项目解读
- 2026年医院洗衣房洗手台污染区管理
- 2026年医院分体空调集中控制与管理
- 2025湖北省中考语文真题(原卷版)
- 2026年育婴员辅食制作与婴幼儿进食习惯培养
- 2026年工程机械驾驶室人机工程学优化
- 2026年车牌识别系统补光灯安装要求
- 2026年糖果用淀粉浇铸成型技术推广
- 2025年高考真题-化学(四川卷) 含解析
- 《2+N糖尿病逆转治疗行业规范与操作流程》
- 文字录入技能竞赛组织方案范文
- JJF 1221-2025汽车排气污染物检测用底盘测功机校准规范
- FSSC22000 V6食品安全管理体系程序文件一整套
- GB/T 46075.4-2025电子束焊机验收检验第4部分:焊接速度的测量
- 人工智能赋能英语听说教学
- 新消防法考试题库(含答案)
- 村级村干部应急知识培训课件
- 2025年河南高考数学试题及答案
- 统编版七年级历史下册期末专项训练:开放创新题(含答案)
评论
0/150
提交评论