IDC MarketScape Worldwide Modern Endpoint Security for Enterprises, 2021
Source: IDC, 2021
What exactly is Modern Endpoint Security (MES)?
According to IDC, MES products combine an endpoint protection platform (EPP) for deterministic prevention, with endpoint detection and response (EDR) for post-compromise reaction. MES is billed as the latest evolution in endpoint security, shifting from point solutions to multifunction platforms, and IDC’s research says that demand for MES is on the rise.
What’s driving the demand?
In a word, time. As IDC’s research VP for Security and Trust, Michael Suby, explains, “Threat actors are finding and exploiting vulnerabilities and weakness in security defenses at a faster pace. Conversely, enterprise security professionals have zero spare time. They must operate faster and more efficiently across a broader IT estate if they ever hope to change circumstances from primarily reacting to threats to getting ahead of threats.”
This is all set against a backdrop of enterprises’ evolving IT footprint across a Work From Anywhere environment, where workers and applications have shifted off premises, and threat actors have not only intensified their focus on endpoints but also advanced their approach.
What criteria should you consider when researching a MES vendor?
IDC presents the following list of MES fundamentals, in order of buyer priority:
Protection efficacy – you should pay close attention to the level of vendor research carried out into never-before-seen threats and attack tactics, along with real results they can demonstrate where new forms of attacks are automatically and deterministically blocked. A proof of concept (POC) is recommended here.
EDR automation – for incident investigation speed and ease. This helps to focus human engagement more on decision making, and less on investigatory processes. In turn, this helps to reduce threat actors’ dwell time and brings time efficiency gains to your security team.
Device support – it’s recommended you check that any MES solution can cover all of your devices and provides unified management, e.g. across recent OS versions of Windows and Mac for PCs, as well as mobile devices, physical and virtual servers, and cloud workloads.
IDC goes on to recommend the examination of cross-function integration, the evaluation of XDR frameworks, questioning ransomware defenses and recovery options, gaining perspective on incorporation of built-in device security capabilities, and finally, the consideration of managed services options.
In this last point, it’s emphasized that a managed service should address your specific needs, from level of engagement, e.g. on-demand collaboration vs around-the-clock outsourcing, to tasks performed, e.g. threat monitoring, threat hunting, and threat response.
Teneo’s WFA: Secured service addresses these points and more. Combining MarketScape-leading technology with elite threat hunting and endpoint detection & response (EDR) capabilities, the service is right-sized to you to help you to eliminate blind spots that a traditional approach to prevention would miss.
This website uses cookies so we can provide you with the best user experience possible.
Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.
Our cookie policy tells you how and why we use cookies, and how this allows us to improve your online experience. You can read our full Cookie Policy here.
Strictly Necessary Cookies
Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.
Third Party Cookies
Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.
Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
Privacy Policy
Whenever you give us your personal data, you must consent to its collection and use in accordance with our privacy policy. This includes our use of cookies. You can read our full Privacy Policy here.