Beyond Next-gen: Defining Future-ready Endpoint Security

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The term “next-gen” is commonly cited by technology vendors to position a product as being innovative based on new and differentiated capabilities. Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology.

ESG conducted market research to explore how organizations employ advanced endpoint security controls. This research revealed that a continuum is at play, with most organizations that ESG interviewed starting with advanced preventative controls to augment their antivirus technology and a smaller number of companies, typically those that are well resourced, employing advanced detection and response capabilities. 

While the use of advanced preventative controls and advanced detection and response controls are not mutually exclusive over time, the weighting toward the former was due in large part to the need to balance the efficacy of better protecting endpoints from compromise with the operational cost of doing so.

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Trend Micro here: https://www.trendmicro.com/en_gb/about/trust-center/privacy.html. Please see Infosecurity Magazine’s privacy policy for more information.