Endpoint Detection and Response (EDR) Questions

Prem
Analyst at a security firm with 501-1,000 employees
Nov 26 2020
I'm an Analyst, Managed Security Services in a Legal firm. Where can I find information about pricing of multiple EDR solution and the support levels provided?
See 2 Answers

Rony_Sklar
IT Central Station
Nov 02 2020
With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer.
In our company, we use only company devices for… more »

Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »

Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »

PaulBecker
Senior Manager- Security Monitoring and Incident Response at Clarios
Aug 13 2020
I'm a Senior Manager- Security Monitoring and Incident Response at a large manufacturing company.
I am looking for thoughts from those who may have done a comparative analysis on these two products within the last 6 months or so. Realizing these technologies have advanced rapidly over the past year or two I would like to hear some current observations.
While I am interested in the value/functionality of the platforms, I am currently focused on assessments around EDR performance and ultimate functionality.
Thanks in advance for your thoughts.

Steve PenderIf you're looking for a NextGen, Machine Learning & AI-driven Active EDR with… more »

ITSecuri7cfdWe didn't consider either of these after demo and comparison from reviews of… more »

Paresh MakwanaCapability Cylance Carbon Black… more »

Menachem D Pritzker
Director of Growth
IT Central Station
Aug 10 2020
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.
Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.
The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.
How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »

Ken ShauretteI like the potential for catching an unusual activity like that with our… more »

Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM)

Rony_Sklar
IT Central Station
How can businesses ensure that they are protected from EternalBlue attacks?

Marc VazquezThe best part of AI products like Sentinel one is they are monitoring for this… more »

Dr Trust Tshepo MapokaEternalBlue exploits officially named MS17-010 by Microsoft is a vulnerability… more »

Nikki WebbEternalBlue exploits a vulnerability in outdated versions of Microsoft Server… more »

Rony_Sklar
IT Central Station
How can businesses protect themselves against Mimikatz malware?

Technicalconsult568Mimiktaz is a post exploitation tool that dumps passwords from memory… more »

Steve PenderMimikatz is a tool developed by Benjamin Delpy that is used to gather credential… more »

Bryan HurdBesides having Microsoft Defender which detects this threat, also the newest… more »

Rony_Sklar
IT Central Station
There are many EDR solutions out there. In your opinion, what are the most important features that an EDR solution should have?
Additionally, what are good questions to ask vendors when researching EDR solutions?

Ian KellerThe answers given by Presh and Akhil are all spot one so I wont touch on those… more »

Akhil KumarThat's true that there are many EDR solutions out there, According to me the… more »

Paresh MakwanaMost Important feature is Prevention – First, this means Effectiveness… more »

Rony_Sklar
IT Central Station
Can EDR replace antivirus, or are both needed?

Matthias De ToffolHello EDR can replace a normal AntiVirus and can offer even more, as they can… more »

ShreekumarNairYou can use EDR solutions to track, monitor, and analyze data on endpoints to… more »

Nikki WebbEDR can replace antivirus, if you get the right EDR solution. A solution that… more »

Frank Yang
Sales Director at a tech services company with 5,001-10,000 employees
I work at a tech services company with 5,000 - 10,000+ employees.
We are currently researching EPP and EDR solutions. What are the main differences between EPP and EDR?
Thanks! I appreciate the help.

Om SalamkayalaI think most of the comments cover all the key points.
EDR-End point… more »

Jehyun ShimEPP is focused on detecting malware, but EDR is focused on logging endpoint an… more »

Owais YousufEndpoint Detection and Response (EDR) is a category of security tools that are… more »
Product Categories
Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Carbon Black CB Defense
Microsoft Defender for Endpoint
SentinelOne
Cortex XDR by Palo Alto Networks
Fidelis Elevate
Cybereason Endpoint Detection & Response
OpenText EnCase eDiscovery
RSA NetWitness Endpoint
Code42 Next-Gen DLP
Symantec Endpoint Detection and Response
Digital Guardian
Buyer's Guide
Download our free Endpoint Detection and Response (EDR) Report and find out what your peers are saying about FireEye, CrowdStrike, Carbon Black, and more!
Quick Links
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- How does EternalBlue work?
- What features are important to look out for when choosing an EDR solution?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- What is Mimikatz?
- Carbon Black and Cylance Comparison for EDR
- What security measures should businesses prioritize to support secure remote work?
- Where can I find approximate pricing for EDR solutions and their support level?