Whitepaper - EDR to secure mobile devices: Coverage, limits & recommendations - Help Net Security

Whitepaper - EDR to secure mobile devices: Coverage, limits & recommendations - Help Net Security

The digitalization of services and expansion of remote working has heightened the number of off-premises users accessing cloud-based resources from their mobile device. In this configuration, each mobile device represents a point of entry for hackers, spies and cyberactivists. To secure information, it is critical to have an endpoint security strategy that reliably encompasses mobile devices and embraces all their aspects (iOS, Android Enterprise).



Today, the cybersecurity market sees a set of solutions extending their offering to mobile, to cover the whole cyberattack surface at once. But as mobile and PC systems handle data and protocols very differently, cyberthreats targeting both systems are distinct.


Endpoint Detection & Response (EDR) is the evolution of legacy antivirus. It quarantines files, detects indicators of compromise, and provides in-depth analysis to enforce post-attack rollback. EDR’s strength lies in its investigation ca ..

Support the originator by clicking the read the rest link below.