10 Most important aspects when getting EDR

The market for Endpoint Detection and Response (EDR) solutions has grown rapidly in recent years and industry experts predict that this trend will continue. Gartner predicts that more than 60% of enterprises will have replaced older antivirus products with combined End Point Protection (EPP) and EDR solutions by the end of 2025 [1].

The need of an holistic Endpoint Security solution is driven both by attacks becoming more frequent and sophisticated and by EDR solutions becoming more accessible to mid-market companies. EDR is no longer a solution for only large enterprises as many cyber security vendors now offer an affordable EDR and EPP combination.

The following are the 10 most important aspects to keep in mind and question your vendor about when buying an EDR solution. These apply whether your organisation is looking to acquire this type of solution for the first time or is going through a regular benchmarking exercise or renewal process.

Going the cloud route doesn’t abdicate responsibility for security

Moving into the cloud has many benefits if is done correctly – from increased agility and flexibility to scalability and moving to an Opex, rather than Capex model. Two aspects organisations will, however, always need to take into account when in the cloud is dealing with data protection and managing its security. While public Cloud Service Providers (CSPs) need to ensure they have the highest levels of security in place, the onus is never solely on them to protect data.

Is SA doing enough to prevent Cyber Attacks?

International cyber crime has been on the rise over the past few years and many enterprise-level organisations and state institutions with extensive security budgets have been hit by cyber-attacks with some literally shut down while they deal with the aftermath.

Institutions such as the likes of Yahoo, Facebook, Marriott International, Twitter, SolarWinds and Maersk as well as major hospitals, universities, municipalities, and other local and international governmental entities make up the list of targeted organisations, and it just continues to go on, seemingly without any end in sight. By now it should go without saying that nobody is entirely safe anymore if they rely on some form of technology that is internet connected, whether directly or indirectly.

Suspicious emails from Postmaster

In IT terms the ‘Postmaster’ is the generic name given to an email server administrator or the alias used for system-generated emails coming from the exchange server. Every domain has one (e.g. postmaster@myexampledomain.co.za) and every user should at some point have received an email from their respective postmaster. The Postmaster is typically inherently trusted by individuals as it is generally utilised to communicate mailbox alerts with end-users. These alerts could be anything relating to email delivery notifications and statuses, password expirations, mailbox limits, security events, and the like.

F-Secure Elements

F-Secure Elements is a cloud-native platform that delivers everything from Vulnerability Management and Collaboration Protection to Endpoint Protection, and Detection and Response. These are the only four elements you need to cover the whole security value chain – all clearly visible and easily managed from a single security console. With super flexible licensing and a security-as-a-service option, you can pick the solutions you need now and ramp up or down as you need to.

F-Secure Elements is easy to manage in-house. Or you can buy it as a fully managed subscription service, which means a whole team of world-class cyber security experts in the built-in Elevate to F-Secure service will always have your back.

Trending News

  • Kaseya ransomware case continues groups’ abuse of trust
  • Attack landscape update: Ransomware 2.0, automated recon & supply chain attacks
  • New research shows how AI in online recommendations can be manipulated
  • Exploitable vulnerability discovered in Apple’s macOS Gatekeeper
  • The CISO’s Dilemma: What the threat landscape looks like from the top

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team