I’m glad to see this research, especially the product report card on P5. I’ve not read through the whole PDF yet (actually going to have to print this out as my middle aged eyes cant handle such small fonts in double column on a screen) but at first glance the work looks solid.
That said, lets all be clear that this is not a The Sky Is Falling issue. As @japhroaig pointed out, HTTPS does not mean “security”. HTTPS does not magically adress all the many other weak points and certainly has nothing to do with the content that is within the encrypted session nor the configuration of the server the content comes from nor the end user PC/phone/whatever.
Regarding the report card on P5, lots of what is shown dont really seem to be “enterprise class firewalls” or even enterprise class products. What is nice to see is that BlueCoat comes out so well in their tests. IIRC BlueCoat is hated by Boing but their product does do what it says it will do on the box. Last place I put them in I got a 60% drop in desktop malware as soon as we enabled that feature.
At my last job, one of my tasks was doing the security orientation for new employees. I spent about 10 minutes of the 60 minute session on this point alone. Surprisingly a good number of the new employees thanked me for this, said that no employer had ever warned them about this issue before.
Endpoint management is just one piece of the puzzle. Definitely an important one but not one that can replace any of the border inspection points. One issue with endpoint management is like the herd immunity problem.
Lets say you have a perfect list of all clients & servers in your environment. Now lets say you can categorize them by criticality of both their infrastructure roles and by the data on or processed by them. Go to your endpoint management console and run reports on which of your devices are up to date. Sort by criticality. Get the idea?
There is a tremendous gold rush over the last few years in data loss prevention products for the enterprise. Some of this can be addressed by some of the HTTP gateway products but unfortunately even with gateway inspection, DLP features/products, locking down PC ports, etc. Data finds its way out.
I think the first person I saw talking about this was Richard Bejtlich and that was many years ago. Not enough people took him seriously unfortunately.
sigh
Now you are making me nostalgic for the says when we all believed in PKI, back when we thought we actually understood how “done right” was supposed to look and how we could scale it.