<!-- show content if JS disabled --> <style> .delay-enter { opacity: 1 !important; } </style>
Endpoints promo

More endpoints, more challenges. Help make sure your security strategy keeps up.

Not too long ago, would-be attackers could only penetrate enterprise security perimeters via a handful of traditional endpoints, such as corporate servers and company-owned computers. With the rise of bring-your-own-device programs and browser-based software, however, the attack surface has morphed into a widening expanse of vulnerability. But many businesses have overlooked the security of these new access points, which could put them at risk for a data breach, according to research conducted by Forrester Consulting and commissioned by Google Cloud.

Out of the 1,200 security and IT professionals surveyed by Forrester, less than half said they consider employee-owned laptops as part of their endpoint security strategy. That number was even lower for employee-owned mobile devices. Yet the overwhelming majority of respondents — 84 percent — said their companies allow employees to access company data from personal laptops, smartphones, and tablets.


A similar disconnect emerged with regard to APIs, which frequently serve as access points to company data. Ninety-seven percent of respondents said they’re concerned about API security, but only 44 percent said their endpoint security strategies take APIs into account.

Asked whether their companies

excel at monitoring endpoints for

malicious activity, only 32

percent answered in the

affirmative.

Since many respondents’ security strategies seem to overlook nontraditional but increasingly common endpoints, it’s not surprising that only 35 percent believe their organization is very effective at managing access to enterprise assets. 

What’s the way forward for business and IT leaders who lack confidence in their current approach to endpoint security?

Forrester recommends working with cloud service providers to help protect and monitor diverse endpoint environments. Cloud providers are in a unique position to help take measures such as forcing user interaction with data through a more secure API and rolling out updates across the entire endpoint security stack.


To find out more about how nontraditional endpoints are changing the security equation for today’s businesses, access the complete Forrester Consulting report.