Israeli anti-evasion endpoint security solution provider Minerva Labs yesterday released the results of a new survey which found anti-malware technology is struggling to keep up with modern digital threats.
600 IT security professionals participated in the Minerva Labs survey. The key takeaway is that the majority of them are wary of suffering a data breach in the coming year and believe that their traditional anti-malware solutions aren’t up to the task of protecting them:
- 48% said they saw the same number of malware infections on their corporate endpoints as they did the year before.
- 32% said they saw an increase in malware infections over that same period.
- 75% said their current anti-malware solution only stops (at most) 70% of malware infections.
Minerva Labs believes the issue arises from innovations in, and the black-market proliferation of, malware evasion techniques which are outpacing traditional anti-malware:
- 32% of their respondents were greatly concerned by malware evasion of analysis and forensics tools.
- 24% were more concerned about fileless malware attacks.
- 67% expressed fears that their current controls weren’t sufficient for protecting their endpoints.
- 53% stated they preferred adding new layers to their existing security rather than outright replacing their current solution.
- 39% said the most important aspect of adding security layers (besides security) was its ability to function in a low resource environment.
In a statement, Minerva Labs’ CO-Founder and CEO Eddy Bobritsky said: “The results from our survey indicate that while malware threats are still growing, endpoints remain highly vulnerable to a cyber-attack. We continue to see more complex and sophisticated threats, where traditional blocking and prevention mechanisms, such as antivirus, are no longer enough to keep endpoints safe. Beyond merely relying on baseline anti-malware solutions to protect endpoints, companies should strengthen their endpoint security architecture to get ahead of adversaries, such as blocking off attempts to get around existing security tools.”
You can read the full release here.