Over the last few years, there has been a lot of talk about next-generation endpoint security and prevention tools versus endpoint detection and response solutions. Many clients ask the same questions about bolstering their security posture and balancing budgets, including where to start, what to augment, what to replace and, most importantly, where to invest.

Although numerous vendors and analysts have said much on this topic, I think it’s important to distill all this information into a simple (if not necessarily easy) method of categorizing and prioritizing approaches. Back in the day, there were endpoint fortresses of signature-based endpoint protection solutions. Then came solutions focused on encryption, host intrusion prevention, etc. Soon after, the endpoint agent became a behemoth requiring its own set of management controls.

Fast forward to the last few years. As we all know, cybercriminals evolved and the threat landscape changed significantly, warranting a whole new breed of solutions. Enter endpoint detection and response (EDR), a term coined by Gartner, which utilizes lightweight sensors so as not to collide with the agent technologies of the past. EDR technologies look at everything from malicious applications to good applications gone rogue using behavioral analytics, heuristics and threat intelligence.

Illuminating Blind Spots

EDR is a huge boon for threat hunters and analysts because it illuminates a significant blind spot for threat telemetry, especially when combined with a security information and event management (SIEM) solution. Why is that? EDR technology provides analysts with a comprehensive view that helps them determine the who, what and when of an incident. Analysts and threat hunters can use that information to determine exactly what action needs to be taken.

If EDR is so great, why not simply replace all endpoint solutions with EDR? This brings us back to the original question of prevention versus detection and response. It has been said that prevention cannot catch everything. There is an entire industry dedicated to thwarting the latest prevention tools, and malicious actors are constantly morphing their techniques, tactics and procedures (TTPs) to bypass any and all controls organizations put in place.

Applying Endpoint Detection and Response

So where is EDR applicable? One of the key determinations is risk identification: Which endpoints or assets should be classified as high-value assets? Your developer systems? Executive or marketing systems? Or perhaps that server containing critical data? Once these points of risk are identified, putting EDR on those assets is a good first step. EDR technologies often do not lock systems or bring them down — they provide monitoring and visibility.

Then again, for many companies, the value of EDR is not just in those high-value or critical assets, but in monitoring all the endpoints in their organization.

You can use an EDR to analyze the activities occurring on the endpoints and determine the appropriate response. But a tool is only as good as what you do with it. My washing machine has many settings, for instance. Although I’m sure the extra settings will leave my clothes extra clean at the end of the cycle, I tend to stick to one or two that are familiar. Similarly, EDR is only as good as what you do with the information it provides. Make sure your organization’s threat hunter or security professional analyzes the data to make sense of what is happening and determine what to do about it.

Choosing the Right EDR Solution

EDR solutions can help address malware, persistent threats, threat actors, application and process behavioral anomalies, and behaviors deviating from your organization’s baseline. It enables security analysts to forbid or permit file sharing applications on specific domains, for example.

When selecting and deploying an EDR solution, consider whether it integrates with your favorite SIEM in a clear, consumable interface with meaningful information. Also consider the flexibility of the solution’s deployment options. Does it provide a full set of rich capabilities to enable threat hunters to pinpoint root cause and not make these decisions on the analyst’s behalf?

Make sure you know who or what within or outside your organization is going to use the endpoint detection and response technology. What skills do they have? Are they able to scour alerts and make sense of the process mapping and what it means for the organization? How would they use this information to make actionable decisions? Are they able to hunt through your network to see if a given threat exists anywhere else? Are they utilizing automation and investigating new techniques and intelligence sources as part of a robust threat hunting platform?

Of course, you can choose to do this all in-house, given the right combination of talent, bandwidth and threat intelligence to get the job done. Or you can choose to investigate a managed security service that can move the needle faster and stay ahead of the game more effectively and less expensively than internal resources. Instead of chasing threats, an EDR solution helps you focus on supporting your core business.

Register for the IBM & Carbon Black webinar: Fixing Endpoint Blindness

More from Endpoint

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…

3 Ways EDR Can Stop Ransomware Attacks

Ransomware attacks are on the rise. While these activities are low-risk and high-reward for criminal groups, their consequences can devastate their target organizations. According to the 2022 Cost of a Data Breach report, the average cost of a ransomware attack is $4.54 million, without including the cost of the ransom itself. Ransomware breaches also took 49 days longer than the data breach average to identify and contain. Worse, criminals will often target the victim again, even after the ransom is…

How EDR Security Supports Defenders in a Data Breach

The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data breach, with just 17% saying this was their first data breach. What can organizations do about this? One solution is endpoint detection and response (EDR) software. Take a look at how an effective EDR solution can help your security teams. …