Published: 19 May 2016
Summary
Increased complexity and frequency of attacks elevate the need for enterprise-scale incident response, broad investigations and a rapid forensic process. Endpoint detection and response tools help organizations speedily investigate security incidents and detect malicious activities and behaviors.
Included in Full Research
- Introduction
- Why Did EDR Tools Appear?
- EDR Tools Defined
- EDR Capabilities
- Capability Summary
- Building a Business Case for EDR
- Business Case: Save on Security Incident Response Costs
- Business Case: Detect Endpoint Threats Better
- Business Case: Provide Endpoint Visibility
- Overcoming Agent Resistance
- EDR Tool Use Cases
- EDR Deployment Methodology and Architecture
- Who Should Deploy EDR?
- Endpoint Coverage
- Deployment Phases
- Information Collection and Centralization Model
- Example Deployment Strategies for EDR Tools
- Essential EDR Processes and Practices
- Select EDR Operations Best Practices
- Personnel Requirement for Effective EDR Tool Use
- Commonly Integrated Tools With EDR
- Key Focus: Threat Intelligence and EDR
- Strengths
- Weaknesses