Skip to main content

Signature-based antivirus solutions are old hat – the future belongs to XDR and EDR solutions. What makes the AV successor EDR better? And what special features do you need to bear in mind when switching to EDR? ensec has the answers for you.

Endpoint security: how to protect servers and end devices today

What is the difference between EDR (Endpoint Detection & Response) and traditional antivirus (AV) software? While AV detects malware, blocks it and then sounds the alarm, modern EDR solutions also provide detailed reports on the attack history, IoC (Indicator of Compromise) and an assessment of criticality.

The AV successors therefore show processes – downloading an email attachment via Microsoft Outlook, saving the file by users, opening the file in Microsoft Excel, executing a macro, reloading malware – in full and in context. This makes security incidents much easier to read, the tool directly supports the processes of the Security Operation Centre and relieves the burden on employees. Further details on EDR solutions can be found in our specialist article on the topic.

It is also important to understand that the definition of “endpoint” in the case of EDR is broad. In addition to classic Windows and Mac clients, EDR software also covers Windows and Linux servers. This list already points to one of the challenges when introducing EDR – in addition to the security specialists in the company, those responsible for the client and server infrastructure must also be at the table. The migration from AV to EDR cannot be accomplished without cross-team collaboration.

And this is exactly where ensec comes into play: We have the expertise to help you integrate the necessary processes. Typically, our customers’ security experts later operate their EDR environments themselves. During the initial integration, however, we are at your side right from the start. In addition to providing support with the actual implementation and configuration, we are also happy to take on the role of project manager. Here we bring all the relevant specialist departments – clients, servers, security, legal, change management, SoC – on board and ensure that the necessary processes are established.

How does the EDR world get started?

The actual introduction of EDR software is technically less complex than is the case with antivirus solutions: After installation, the agents on the endpoints connect to the management server operated in the cloud or on-prem and can be controlled centrally from there.

Before the software is activated, a baseline is created. This means recording normal operation in order to avoid false-positive alarms later on. ensec takes on this task for you – we monitor a number of endpoints agreed with you and check each message to see whether it was false-positive. We advise you on the point at which the solution switches from pure detection to response mode.

In addition, our experts will help your security teams to correctly interpret the messages generated by the software. Our services also include training for operational and application managers.

Once the Endpoint Detection & Response solution is up and running, our support services will be at your side in the future. Would you like a service level that goes beyond reactive support? Then let’s talk about a managed service offer.

XDR

While EDR is limited to what happens on the endpoints, XDR solutions expand this view to include information from network elements or cloud applications. In the event of an incident, all of this information is correlated to form a big picture, providing a clearer picture of the attack vector. This makes the work of SOC specialists, for example, much easier.

Endpoint Security in Detail

EDR

Flexible working, independent of location and not always in connection with the company network. This requires protection not only at the perimeter but also directly at the endpoint. Intelligent mechanisms recognise and report attacks within milliseconds.

XDR

Extended Detection and Response links the endpoints with network elements and cloud applications with the aim of further correlating and automating the analyses. In other words, an extension of EDR.

Mobile Security

Mobile devices enable easy access to cloud services such as Microsoft 365 etc. Business data and resources must also be protected there. This can be ensured with a mobile security container, for example, which creates a protected company area on personal devices.

From a business perspective

EDR reduces your operating costs in several areas.

Compared to antivirus solutions, EDR systems are cheaper to operate. They do not require extensive maintenance, do not require attention in terms of signature downloads and, thanks to context-based reports, shorten troubleshooting if, contrary to expectations, an infection occurs.

These reports not only save internal man-hours. They often also answer the question of whether external forensics experts should be hired. Or whether internal specialists can accurately identify the infected components and possible data leaks on their own thanks to the better situational awareness compared to antivirus solutions.

And even in the context of a data breach, time is money. EDR software allows you to identify the breach faster and more accurately. This time advantage can make a decisive contribution to minimising the financial losses caused by the data breach.

May we personally provide you with arguments in favour of ensec? Please contact us.

Or give us a call:

+41 44 711 11 44