Hack-and-leak operation dropping at the last minute, depriving the opposing party of sufficient time to respond;21%
Planting stories at the last minute on websites that are associates with fake documents and images;63%
Lingering threats that go beyond election day that are really designed to undermine the confidence in our election system13%
Other (comment below)1%
Complete13%
This calendar year28%
1-2 years28%
3-5 years9%
No plans20%
No selling.
No recruiting.
No self promotion.
Rules of EngagementFAQsPrivacy
© 2025 Gartner, Inc. and/or its affiliates. All rights reserved.
Below are some reasons to justify the WHY and WHAT around EDR:
Provides the ability to isolate a machine while the team investigates.
Deeper insights into what is happening, allowing the team to respond and ultimately remediate quickly.
Additional reporting on the state of our security/compliance posture.
Help determine the scope and impact of an incident.
Ability to search across all devices and help identify indicators of similar compromise.
Ability to clean and block files across all machines.
Conduct malware analysis, we are not currently able to do this with our current Sophos deployment.
Agree?