In a nutshell
Beitrag teilen
Reading time 4 minutes
1. What is Endpoint Security?
Endpoint Security is the protection of endpoints such as desktops, laptops and mobile devices from exploitation by malicious actors.
Among the threats to which endpoints are exposed are the infiltration of malware or a remote access Trojan (RAT). Unwanted data leakage or the connection of external mass storage devices can also compromise the confidentiality of corporate data.
The package of measures usually consists of
together.
The digital transformation of companies with a steadily increasing number of mobile workstations, the adaptation of the cloud and the increased attack surface increase the need for protection. Endpoint protection thus continues to gain relevance since they are often the entry point of cybersecurity threats.
2. Measures to protect end devices
Technical measures for user devices are often marketed by manufacturers as Endpoint Protection Platform (EPP). These can include preventive, detective but also reactive measures such as:
The most important organisational measures for users include regular security awareness training on current threats such as phishing. Security policies for handling end devices, external data storage or the corporate network must also be included.
To support network security, additional measures such as IDS/IPS, web proxies, phishing detection can support endpoint security.
The advantage of network-based measures is the reduction of resource consumption on the endpoints due to fewer agents and broader, network-based visibility.
3. Endpoint Protection Platforms (EPP).
An endpoint protection platform is designed to prevent threats such as known malware and advanced threats such as fileless attacks and ransomware. Sure, zero-day exploits tend not to get caught, but basic IT hygiene can be achieved. One detects malicious activity using several techniques:
Static analysis: analysing binaries and looking for malicious characteristics before execution with machine learning algorithms.
These endpoint security solutions offer other more passive protection features such as disk encryption, host-based firewalls and data loss prevention features.
Many of these solutions work cloud-based without an on-premises management server to ensure continuous monitoring even in a work from home environment. With some providers, not only the management is outsourced to the cloud, but also parts of the detection functions themselves. The endpoint agent no longer needs to maintain a local database with all known IOCs (Indicators of Compromise). A cloud API is sufficient to classify unknown objects.
Vendors of these classic endpoint device platforms include Broadcom (Symantec), Microsoft, Trend Micro, SentinelOne, Sophos, Crowdstrike. A constantly updated list can be found at Gartner.
4. Endpoint Detection and Response (EDR)
EDR solutions complement EPP platforms by also including the temporally upstream suspicious activity and the temporally downstream incident response in the monitoring.
This is also reflected by the letters D and R in EDR.
The main functions of an EDR platform are:
For endpoint protection, EDR software specifically provides more visibility and influence over attacks with current malware compared to traditional EPP/anti-virus software.
The providers of EDR endpoint security software include many manufacturers already listed in the previous EPP section ( EDR list by Gartner).
Admittedly, the line on the vendor side is blurring between EPP software and EDR software, as features of both product lines are often merged into one integrated product. As a result, endpoint protection based on each vendor's own DER/EPP software is defined a little differently.
Comparison Endpoint Protection Platform vs. Endpoint Detection & Response
Feature | Endpoint Protection Platform (EPP) | Endpoint Detection & Response (EDR) |
---|---|---|
Target | Prevention of known threats and maybe a few unknown ones | Improve visibility and capability of incident response activities on the endpoint |
Influence | Low | Active detection of threats possible |
Security incident support | Passive threat protection | Supports security incident handling as an incident response tool |
5. MDR and XDR
The EDR platform provides excellent insight and visibility to the in-house security team to ensure monitoring of the infrastructure. To fully utilize its potential, sufficient resources are needed, which can be difficult to acquire within one's own team.
Inhalt
Releated Content
What is data security? Standards & Technologies
Data security is an important topic for all companies and authorities. Learn more about threats, measures and the legal framework here.
Read more...Authentication: Differences to authorisation
Authentication and authorization are two words used in IT-Security. They might sound similar but are completely different from each other....
Read more...Attack Vector and Attack Surface)
An attack vector is a way for attackers to penetrate a network or IT system. Typical attack vectors include ...,
Read more...Buffer Overflow
A buffer overflow is a programming error that can be exploited by hackers to gain unauthorized access to IT systems. It is one of the best-known...
Read more...Cybersecurity concept in 8 steps
A cybersecurity security concept refers to guidelines that are intended to ensure IT security in the company. It is about ensuring the availability,...
Read more...Proxy Server
A proxy server works as an intermediary between two IT systems. Proxy servers offer different functionalities, improved security and optimised data...
Read more...What is MITRE ATT&CK?
The MITRE ATT&CK Framework is a continuously updated knowledge base consisting of cyber attacker tactics and techniques across the attack lifecycle.
Read more...Need to Know Principle
The need-to-know principle describes a security objective for confidential information. Access should only be granted to a user if the information is...
Read more...Top 10 Vulnerability Scanners for 2024
Vulnerability scanners are automated tools that organisations can use to monitor their networks, systems and applications for security weaknesses....
Read more...NTLM Authentication
In this article, we explain what NTLM authentication is, how it works, and how it can be exploited by attackers.
Read more...Information Security Management Systems (ISMS)
An Information Security Management System (ISMS) defines methods to ensure information security in an organisation.
Read more...CVSS (Common Vulnerability Scoring System)
The CVSS Score provides a numerical representation (0.0 to 10.0) of the severity of a security vulnerability in IT. We explain how the Common...
Read more...What is Information Security?
Information security is intended to ensure the confidentiality, integrity and availability of information. The information can be available on IT...
Read more...CIS Controls - A Quick Overview of CIS Controls
The CIS Critical Security Controls (CIS Controls) are a prioritized list of protective measures to defend against the most common cyber attacks on IT...
Read more...Penetration Tester Career Guide
How does one actually become a pentester? What does a pentester earn? Do career changers also have a chance? And what does a penetration tester do all...
Read more...Firewalls & Firewall-Architecture
How does a firewall actually work? What does a good enterprise firewall architecture look like? To what extent does appropriate network segmentation...
Read more...Have we sparked your interest?
Just give us a call or write us a message!