Microsoft Defender for Endpoint Questions

Rony_Sklar
IT Central Station
Aug 25 2020
CrowdStrike Falcon and Microsoft Defender ATP are popular tools for EDR. Have you done a POC on these two tools, or had experience using them? If so, please share some insights on how these products perform, and which you would recommend.

R.G.In a nutshell, Microsoft as most of its products tend to be behind the leaders… more »

Steve PenderSentinelOne is my recommended solution.
The SentinelOne Endpoint Protection… more »
See 3 Answers
Endpoint Protection (EPP) for Business Questions

Rony_Sklar
IT Central Station
Jan 13 2021
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?

SimonClark
Dan Doggendorf gave sound advice.
Whilst some of the free or cheap… more »

Dan DoggendorfThe biggest threat is risks you think you have managed are not managed at all so… more »

Javier MedinaYou should build a lab, try the tools and analyze the traffic and behavior with… more »

Rony_Sklar
IT Central Station
Nov 02 2020
With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe PanardieThere is not a single answer.
In our company, we use only company devices for… more »

Letsogile BaloiSecurity is a multi-layered problem and as always the human end is the weak… more »

Omer MohammedWearing a mask while accessing your service is not a joke hardening tunneling… more »

Rony_Sklar
IT Central Station
Oct 05 2020
Why should businesses invest in endpoint security?
What tips do you have for businesses to ensure that they have the right endpoint security measures in place?

reviewer1257849The endpoint is the weakest link on the network
Since we put in all the best… more »

Menachem D Pritzker
Director of Growth
IT Central Station
Aug 10 2020
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass.
Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and several high profile tech companies, including Apple and Uber.
The hackers posted variation of a message asking follower to transfer thousands of dollars in Bitcoin, with the promise that double the donated amount would be returned.
How could Twitter have been better prepared for this? How do you rate their response?

Ken ShauretteFor some good information from a leading expert check out the webinar today 7/17… more »

Ken ShauretteI like the potential for catching an unusual activity like that with our… more »

Russell WebsterSpan of control, Solid RBAC, Privileged Access Management (PAM)

Rony_Sklar
IT Central Station
What is the difference between a compromise assessment and threat hunting? How do each contribute to Endpoint Protection?

Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »

Nikki WebbThreat hunting typically comes before a compromise assessment.
Threat Hunting… more »

Rony_Sklar
IT Central Station
Aug 26 2020
Which EPP provider does the best job at ransomware protection? Which provider is best at proactively defending against unknown threats?

Paresh MakwanaCylance:
One of the fastest growing vendors in the Endpoint Security market,… more »

Steve PenderSentinelOne is my recommended solution.
The SentinelOne Endpoint Protection… more »

reviewer1272021There are several good ones and it depends on budget, integrations needed, staff… more »

Frank Yang
Sales Director at a tech services company with 5,001-10,000 employees
I work at a tech services company with 5,000 - 10,000+ employees.
We are currently researching EPP and EDR solutions. What are the main differences between EPP and EDR?
Thanks! I appreciate the help.

Om SalamkayalaI think most of the comments cover all the key points.
EDR-End point… more »

Jehyun ShimEPP is focused on detecting malware, but EDR is focused on logging endpoint an… more »

Owais YousufEndpoint Detection and Response (EDR) is a category of security tools that are… more »

Mostafa
System Administrator at Suez Canal Insurance
What is the best for ransomware infection?

Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.

Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »

Ariel Lindenfeld
Sr. Director of Community
IT Central Station
Sep 14 2020
Let the community know what you think. Share your opinions now!

it_user400131evaluation of endpoint protection should look at what the product offers for… more »

it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
FireEye Endpoint Security
Cisco AMP for Endpoints
Symantec Endpoint Detection and Response
Bitdefender GravityZone Ultra
Sophos Intercept X
Check Point Endpoint Security
Trend Micro XDR
Fortinet FortiEDR
McAfee MVISION Endpoint Detection and Response
Cybereason Endpoint Detection & Response
Digital Guardian
Buyer's Guide
Download our free Microsoft Defender for Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
- CrowdStrike Falcon vs Microsoft Defender ATP: Comparison of features and performance
- What is the biggest difference between EPP and EDR products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- Which ransomware is the biggest threat in 2020?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- What is the best for ransomware infection?
- Compromise Assessment vs Threat Hunting
- What security measures should businesses prioritize to support secure remote work?
- Why is endpoint security important?