• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Business   »   The Endpoint Detection and Response (EDR) Conversation

The Endpoint Detection and Response (EDR) Conversation

  • Posted on:April 3, 2018
  • Posted in:Business, Endpoint, Security
  • Posted by:
    Trend Micro
0

Submitted by Steve Duncan

There’s a great deal of interest in the market for Endpoint Detection and Response (EDR). I had the chance to sit down and talk with Jon Oltsik of the Enterprise Security Group (ESG) to talk about changes in endpoint protection as it pertains to EDR.

What’s driving the buzz about EDR? Firstly, enterprises are always looking for new techniques to protect themselves from increasingly sophisticated malware and some standalone EDR vendors deliver their detection and response capabilities as part of EDR. Secondly, once an attack is discovered, customers want to know what was the root cause, and how it spread. Only by having events on the endpoint recorded, can you determine that, and EDR is sometimes a useful tool.

The downside of EDR is that it is operationally intensive. When you combine that with a global skills shortage in cybersecurity and the high level of skills needed to use the root cause tools, many customers can’t keep with EDR.  Trend is addressing that in a couple of ways. We recognize that the highest priority for customers is improved detection and response, so we’ve integrated these capabilities into our endpoint protection platform to leverage the automation that already exists. For instance, advanced detection capabilities such as behavioral analysis, pre-execution machine learning, run-time machine learning and vulnerability protection work in concert with other endpoint detection and remediation capabilities.

For enterprises that want to have root cause analysis capabilities on top of their advanced detection and response, Trend offers Endpoint Sensor that allows them to query endpoints and build detailed analysis of how and where advanced attacks occurred. For those enterprises that may not have skilled threat researchers to develop this Trend is expanding it’s Managed Detection and Response services that’s already available in some limited geographies.

Fundamentally when you build in detection and response to endpoint protection that already has advanced automation, you are providing enterprises with a better layered protection. At Trend we called this XGen™:  a cross-generational blend of threat techniques that uses the right technique at the right time for the best possible protection.

Watch our conversation here.

Related posts:

  1. Best Practices for Endpoint Detection and Response
  2. 3 Reasons MSPs Must Evolve Beyond Endpoint Detection and Response
  3. Beyond the Endpoint: Why Organizations are Choosing XDR for Holistic Detection and Response
  4. Can Your Managed Detection and Response Service Do This?

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.