Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsCyber ProductsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Endpoint detection & response and its cybersecurity benefits

By David Corlette
endpoint-detection-and-response-fp1170.jpg

Image via Freepik

December 5, 2022

Cybersecurity tools tend to be fragmented since you likely deal with multiple vendors, contracts, billing metrics, and other devices. This disjointedness can create security gaps within your systems that are exploitable. Furthermore, fileless attacks or advanced persistent threats (APTS) are increasingly common and can damage an organization’s networks.

Signature-based tools (AV) are necessary but insufficient since all but the most basic attacks now include obfuscation and evasive techniques. Next-gen AV — machine learning and behavioral-based detection —  is now the bare minimum. Endpoint detection and response, or EDR, solutions can provide better behavioral visibility and investigation capabilities of any borderline endpoint activity.

With attacks moving down-market, EDR is increasingly required even for smaller companies based on their risk profile. However, because the feasibility of attack increases exponentially based on one's ability to defend from attack, cyber leaders shouldn't treat EDR as another tool that can manage without integration with other endpoint technologies — as is often the case with AV, patch and vulnerability management, network intrusion detection, and DNS security.

 

EDR Solutions Can Provide Four Major Capabilities

EDR’s primary strength capabilities include the following:

  • Attack prevention: Blocking security incidents at network endpoints and keeping them from spreading across your entire network.
  • Incident response: EDR solutions provide incident response capabilities, such as prioritization and investigation, which can help your security team respond more quickly to attacks.
  • Advanced threat detection: EDR software can detect anomalies on endpoints and malicious activity on the network. In addition, it provides for more than just looking for file-based malware.
  • Incident investigation: EDR makes forensic investigation of incidents easier by building one central repository of endpoint data and preparing it for analysis.

Endpoint security (including EDR) is the second-to-last line of defense, deployed after earlier layers of security such as network and email, but before end users enter the picture. As a result, all these layers must work together to defend against threats, leveraging techniques such as machine learning and end users’ proficiency with and application of security awareness training.

Every organization must possess on-the-go protection, meaning fully independent protection on all endpoints. This should be bolstered with cloud telemetry, analytics, and management. From the end user's perspective, this protection should be independent of being on- or off-network. From the IT team's perspective, remote endpoints must be monitored, managed, and fully accessible, just like on-premise endpoints.

 

What IT Should Look For

Look for vendors that provide a suite of security solutions covering a broad swath of security needs focusing on the “cyber kill-chain” of typical attack patterns: phishing via email and attempted endpoint compromise and exploiting users’ trust to gain access. Email, web, network, and endpoint protection are essential, as are end-user training, threat intelligence, identity management, and backup. While no vendor can provide everything, consolidation is generally a positive.

Additionally, watch out for vendors that provide a broad set of capabilities, some poorly executed. All components in a suite should be of high quality, and you should be on the lookout for excessively costly vendors charging for numerous add-ons. Finally, billing should be clear and transparent.

 

Complete Visibility Means Stronger Endpoint Protection

Protect endpoints from hackers without giving them a gateway into your corporate network. Risks include gaps created by poor default configuration and confusing options, additional burdens on the IT team, poor product quality (lack of detection efficacy and inefficient operation), and lack of integration with related solutions.

Any endpoint solution — whether traditional AV or EDR — should support a fully set-it-and-forget-it operation: it should block nearly all threats with minimal setup and configuration. When threats are discovered, an investigation should focus on root cause analysis and future system hardening, with relevant, actionable data shown in practical, informative ways. At the same time, you want to avoid creating additional work maintaining definitions, signatures, and updates.

The core product efficacy should be verifiable by independent testing agencies such as AV Comparatives and AV Test. Beware of random review sites and "pay to play" testers who may exhibit conscious or unconscious bias. EDR provides real-time visibility into endpoint activities by detecting malicious behavior, responding to threats, and recording endpoint data. There is an assumption that a human will be looking at the results for certain kinds of threats. Therefore, aside from detection efficacy, investigation results must be usable, reliable, and transparent with high quality.

A high-quality endpoint solution will not solve the security problem if IT staff have to monitor and manage multiple other endpoint products simultaneously independently. The many endpoint security capabilities should work together to block and investigate threats. Traditional AV, next-gen AV, and EDR features can now be found in a single package to avoid confusion and conflicts. Network and DNS protection must be fully integrated since many threats propagate over the air. Consider integrated vulnerability and patch management to harden systems and respond to EDR investigations proactively. 

As the Gartner Hype Cycle for Endpoint Security notes, these issues are essential. For example, it states that ransomware attackers have evolved from using simple automated techniques to highly organized human-operated campaigns to extract the maximum ransom from victims. For this reason, it’s crucial for risk management leaders to correlate data from the endpoint and many other security points to support threat hunting.

Gartner further calls EDR "a new type of security technology," which helps shorten response times. EDR solutions help companies detect and respond to threats quickly, in real-time — the threats that have bypassed your EPP or other security tools. In essence, EDR provides exceedingly quick access to information about an attack.

KEYWORDS: cyber security endpoint security network security risk management threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Corlette is vice president of product management at VIPRE Security Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber threat detection

    Empowering analysts to strengthen detection and response initiatives

    See More
  • phone with lock on purple screen and yellow background

    An in-depth look at cyber protection: extended detection and response

    See More
  • cyber learning freepik

    Why schools need to incorporate endpoint management into their proactive cybersecurity strategy for 2021 and beyond

    See More

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!