This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select "Click Here" to open the Privacy Preference Center and select "Functional Cookies" in the menu. You can switch the tab back to "Active" or disable by moving the tab to "Inactive." Click "Save Settings."

It Starts With The Endpoint: SANS 2018 Endpoint Security Survey Results


Endpoints almost always represent the first pawn in an attacker’s malicious movements inside a victim environment: Phishing, ransomware, and other forms of email- and browser-based attacks are compromising user endpoints, then attackers are using those endpoints to pivot deeper into the network. Servers are also problematic, as the many successful attacks on Web, email, DNS, and network and security devices have proven. Even printers and newer forms of endpoints are coming under compromise, according to the 2017 SANS Endpoint Security Survey.

In this 2018 survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

Key Takeaways

  • The different types of endpoints connecting to enterprise networks
  • What type of endpoints respondents consider most at risk
  • The types of exploits starting at endpoints
  • Best and worst endpoint prevention and detection capabilities
  • The value of proactive prevention techniques such as hunting, intelligence/machine learning and vulnerability management
  • Integrative technologies and functions used to protect and defend the end

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language