Evaluating Elements of an Effective Endpoint Security Strategy

Evaluating Elements of an Effective Endpoint Security Strategy


One in every four organizations is looking to refine their endpoint security strategy in the next 12-18 months, according to a recent survey by ESG. This desire for change is surprising in an industry that has existed for more than two decades. Why—more than twenty years later—are organizations still constantly looking to refine their security strategy?


The interest in new endpoint security controls is driven by several factors, including fear of breach or business disruption, desire to strengthen security strategy following a breach or malware incident (e.g. ransomware, phishing), development of an incident response program, consolidation of disparate security tools, migration to the cloud/SaaS, or organizational changes like a merger, acquisition, or new security leadership.


With an increasingly large number of endpoint security options to choose from, how do organizations ensure that their selection and overall strategy is the best fit for their needs and not influenced by marketing hype? To develop an effective endpoint security strategy, organizations should focus their research and evaluation process on the following five elements: endpoint detection and response, prevention, hardening and risk analytics, operational simplicity, and product evaluation.


Endpoint Detection and Response


The first critical element of an endpoint security strategy is detection and response (EDR). These solutions are designed to assume a compromise has occurred. To support this, they constantly monitor and analyze endpoint events to provide suspicious activity detection and containment. Using historic and live data search and investigation, threat hunting capabilities, and insights these solutions can identify what happened before, during and after the attack.


No organization is 100 percent unbreachable. Therefore, it is especially important to invest in EDR ..

Support the originator by clicking the read the rest link below.