Wondering about endpoint security and rootkit attacks? Get insights from 400 IT managers (200 in the United States and 200 in the United Kingdom) on securing endpoint devices, addressing the risk of rootkits, and preferred security vendors. This report provides benchmarking data that you can use in your IT environment, including managing security for mobile and remote workers and recovering from a rootkit attack. You may already know that today’s threat landscape is increasingly dangerous because rootkits and other stealthy threats can evade traditional security measures. These threats are able to load before the operating system, which means they can load before antivirus protection. This research reveals that one in four IT managers has already experienced a rootkit attack, and as a result, has dealt with costly recovery and lost productivity across the organization. Another disturbing finding is that the time to detection for a rootkit attack is approximately one week—extremely high risk for any enterprise environment. Not surprisingly, gaining protection from malware and viruses was identified as the leading security effort for IT managers in the United States and United Kingdom. Read this report to find out how your peers are navigating today’s threats and learn which security vendors offer the most trusted protection.