CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◆ Security Tools & Reviews Apr 30, 2026

State of Security 2026: Endpoint Security - iTnews

iTnews Archived Apr 30, 2026 ✓ Full text saved

State of Security 2026: Endpoint Security iTnews

Full text archived locally
✦ AI Summary · Claude Sonnet


    BROWSE BY CATEGORY proudly sponsored by There was once a time when endpoint protection was the primary focus for cyber security, but those days are long past. While protecting end points remains critical, this task has been swamped by a miasma of additional considerations, meaning many of the core tasks required for defending end points are now embedded in more capable tools. Over time however even these are often being incorporated into yet more powerful platforms. One example is endpoint detection and response (EDR), which became a critical source of detailed telemetry, capturing high-fidelity information on process execution, user behaviour, and system activity. In recent years however EDR has been incorporated into extended detection and response (XDR). While EDR is a foundational capability, providing deep endpoint visibility, forensic investigation, and the host-level detection and response that broader platforms rely on, it is now only a component of what is required for threat detection and response. This is even reflected in the work of the analyst firms, with Forrester retiring its Endpoint Security Wave report series altogether in 2026. Forrester’s reasoning was that while EDR had provided a way to watch for potentially malicious actions on endpoints, over time these capabilities had been assumed by XDR. While effective EDR capabilities are critical, its value now comes through its ability to operate seamlessly within XDR or SIEM platforms, sharing data in a consistent format and enabling cross-domain analysis. In this model, the endpoint is no longer the primary control point, but one of several critical sensors contributing to a unified security posture. While the market for EDR has evolved, there are still numerous pockets of more traditional end point protection that are fighting on. One of these is antivirus protection, which has undergone its own evolution from matching signatures to monitoring behaviour. According to the Business Research Company, the global antivirus software market reached US$4.19 billion ($6.01 billion) in 2025, and is expected to grow to US$5.75 billion ($8.25 billion) in 2030. Host-based firewalls also continue to play a critical role in controlling inbound and outbound traffic at the device level and enforcing segmentation and policy locally, and are now seeing greater integration with identity and device posture capabilities as part of zero trust enforcement. Device control and data loss prevention (DLP) also sits within the realm of endpoint protection and has experienced tighter alignment with identity and classification systems, as the focus moves from protecting devices to protecting data through the devices. DLP is a small but fast-growing market, whose value is estimated by Markets and Markets as being worth US$8.9 billion ($12.8 billion) by 2028. Unified endpoint management (UEM) tools also remain prominent, performing tasks such as device provisioning and configuration, policy enforcement, patching and updates, and application deployments, and supporting zero trust programs through device posture. The market for UEM is estimated by Mordor Intelligence to be worth US$8.85 billion ($12.7 billion) in 2026, rising sharply to US$27.83 billion ($39.94 billion) in 2031. However, while these technologies are still critical, they are increasingly being evaluated and deployed as part of broader platforms. Endpoint protection has not diminished in importance, but it has been redefined, and functions as a critical source of telemetry within broader, integrated security platforms rather than being the primary line of defence. As much as endpoint security might be disappearing in its traditional form, it is actually becoming more valuable, precisely because it is no longer standing alone. Case Study: Cleanaway Waste Management Australian waste, recycling, and resource recovery services company Cleanaway Waste Management is consolidating its sprawling mix of cybersecurity tools in response to a rapidly changing threat landscape. According to Cleanaway’s chief security officer James Court, the company’s global expansion has altered its threat exposure, and he has also witnessed a recent significant change in threat actor behaviour. These factors have forced a rethink of how Cleanaway protects an environment that includes well over 15,000 assets. “Up until recently (threat actor activity) was all about gaining access to systems and ransomware,” Court said. “But now it is purely destructive. We’ve had to pause and ask if we have the right business continuity and resiliency processes in place.” Cleanaway operates a highly distributed and mixed technology environment, including corporate IT and mobile devices (many of which are fitted directly to its fleet of 4800 trucks), as well as numerous unmanaged devices, and operational technology (OT) assets including fuel bowsers and weather stations. Court said that while thousands of endpoints were covered by modern detection and response tools, a subset of devices remained difficult to secure using standard approaches. Although Cleanaway was not included under the Security of Critical Infrastructure (SOCI) Act of 2018, Court said the company’s involvement in complex supply chains, particularly in industries such as healthcare, meant he was sensitive to third party risk. The company’s endpoint challenge had also been further complicated by the company’s expansion into New Zealand and the Middle East. According to Court, this complexity has led the company to take a layered approach. “One endpoint capability doesn’t tick all of the boxes for us,” Court said. “There is a varying mix of technologies we use, so not one (cyber) capability fits every situation for us.” Cleanaway’s platform currently includes endpoint protection from CrowdStrike and Microsoft, as well as OT protection from Claroty. While its cybersecurity stack has consisted of more than 20 suppliers, Court said this was being consolidated around five strategic vendors. While this would deliver cost and efficiency benefits, Court said the company would maintain its commitment to defence in depth and would carefully examine how these changes influenced its long-term security posture. “I hate platform-isation, because it locks you into a vendor, and you then have to think about their roadmap,” Court said. “But we need to do more with less - it’s not going to be an endless, bottomless bucket of money.” Court said Cleanaway was also 18 months into a Zero Trust transformation, with investments in identity and access management (IAM) and SD-WAN connectivity. Critical to this work has been its investment in identity as a key tool for endpoint threat management, with Court warning that organisations that failed to implement mature IAM programs faced significant blind spots, especially where endpoint agents could not be deployed. “You can’t separate identity from the endpoint now,” Court said. “You have to look at them together, because there can be important context that you miss otherwise.” Browse by Category Click on the tiles below to see how each of the categories are responding to security threats in their sector. Security Champions The 2026 State of Security sponsors have worked tirelessly to improve the safety of end user organisations. We are proud to present this year's State of Security champions, and showcase the work they do. MOST POPULAR TECH STORIES   Guzman y Gomez cooks up plan for agentic kitchens Macquarie Bank saves 130,000 hours in seven months of Gemini Enterprise use ABC drops Salesforce for Braze NAB is building an "AI science" team TAL prioritises data and AI with "largest-ever technology deal"   HamiltonJet partners with digital services provider Fortude SentinelOne signs distribution agreement with Sektor Rapid7’s new SIEM combines exposure management with threat detection The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff Bluechip Infotech enters final stage of Goodson Imports acquisition   Blackberry celebrates "giant step forward" 'Touch-free' smartphone controlled with head movements Photos: Australian industry explores data for net zero Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies Govt launches consumer tech label program for smart devices ACCEPT By using our site you accept that we use and share cookies and similar technologies to perform analytics and provide content and ads tailored to your interests. By continuing to use our site, you consent to this. Please see our Cookie Policy for more information.
    💬 Team Notes
    Article Info
    Source
    iTnews
    Category
    ◆ Security Tools & Reviews
    Published
    Apr 30, 2026
    Archived
    Apr 30, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗