Endpoint Protection (EPP) for Business Questions

Rony_Sklar
IT Central Station
Jan 13 2021
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?

SimonClark
Dan Doggendorf gave sound advice.
Whilst some of the free or cheap… more »

Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »

Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »
See 11 Answers

Rony_Sklar
IT Central Station
Nov 02 2020
With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer.
In our company, we use only company devices for… more »

Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »

Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »

Rony_Sklar
IT Central Station
Oct 05 2020
Why should businesses invest in endpoint security?
What tips do you have for businesses to ensure that they have the right endpoint security measures in place?

reviewer1257849The endpoint is the weakest link on the network
Since we put in all the best… more »

Menachem D Pritzker
Director of Growth
IT Central Station
Aug 10 2020
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.
Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.
The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.
How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »

Ken ShauretteI like the potential for catching an unusual activity like that with our… more »

Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM)

Rony_Sklar
IT Central Station
What is the difference between a compromise assessment and threat hunting? How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »

Nikki WebbThreat hunting typically comes before a compromise assessment.
Threat Hunting… more »

Rony_Sklar
IT Central Station
Aug 26 2020
Which EPP provider does the best job at ransomware protection? Which provider is best at proactively defending against unknown threats?

Paresh MakwanaCylance:
One of the fastest growing vendors in the Endpoint Security market,… more »

Steve PenderSentinelOne is my recommended solution.
The SentinelOne Endpoint Protection… more »

reviewer1272021There are several good ones and it depends on budget, integrations needed, staff… more »

Frank Yang
Sales Director at a tech services company with 5,001-10,000 employees
I work at a tech services company with 5,000 - 10,000+ employees.
We are currently researching EPP and EDR solutions. What are the main differences between EPP and EDR?
Thanks! I appreciate the help.

Om SalamkayalaI think most of the comments cover all the key points.
EDR-End point… more »

Jehyun ShimEPP is focused on detecting malware, but EDR is focused on logging endpoint an… more »

Owais YousufEndpoint Detection and Response (EDR) is a category of security tools that are… more »

Mostafa
System Administrator at Suez Canal Insurance
What is the best for ransomware infection?

Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.

Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »

Ariel Lindenfeld
Sr. Director of Community
IT Central Station
Sep 14 2020
Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »

it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
Product Categories
Endpoint Protection (EPP) for BusinessPopular Comparisons
Microsoft Defender Antivirus
Symantec End-user Endpoint Security
Kaspersky Endpoint Security
SentinelOne
Bitdefender GravityZone Ultra
Sophos Intercept X
CrowdStrike Falcon
Carbon Black CB Defense
CylancePROTECT
Cortex XDR by Palo Alto Networks
Panda Security Adaptive Defense
Webroot Business Endpoint Protection
Check Point Endpoint Security
Fortinet FortiClient
Trend Micro Deep Security
Buyer's Guide
Download our free ESET Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
- What is the biggest difference between EPP and EDR products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- Which ransomware is the biggest threat in 2020?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- What is the best for ransomware infection?
- Compromise Assessment vs Threat Hunting
- What security measures should businesses prioritize to support secure remote work?
- Why is endpoint security important?