End-user computing and support organizations use client management tools (CMTs) to automate endpoint management tasks. CMTs perform the following technical functions: • OS deployment • Hardware and software inventory • Software distribution • Patch management • Configuration management (e.g., scripts) • Security configuration management • Remote control Organizations primarily use CMTs to manage PCs running Microsoft Windows and Apple macOS. Although most organizations still leverage separate management approaches for mobile devices and PCs, unified endpoint management (UEM) supports the convergence of enterprise mobility management (EMM) and CMT functionality. Organizations are increasingly looking for a single vendor and management platform to support PCs and mobile devices.
The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance
An Endpoint Protection Platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware, to detect and block malicious activity from trusted and untrusted applications, and to provide the investigation and remediation capabilities needed to dynamically respond to security incidents and alerts.
PAM tools help organizations provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access. PAM tools offer features that enable security and risk leaders to: • For all use cases: o Discover privileged accounts on systems, devices and applications for subsequent management. o Automatically randomize, manage and vault passwords and other credentials for administrative, service and application accounts. o Control access to privileged accounts, including shared and “firecall” (emergency access) accounts. o Isolate, monitor, record and audit privileged access sessions, commands and actions.