What is Modern Endpoint Security?

December 03, 2021

In November, IDC released their IDC MarketScape: Worldwide Modern Endpoint Security for Enterprises 2021 Vendor Assessment. Here, we’ve outlined a quick snapshot of their findings:

 

IDC MarketScape Worldwide Modern Endpoint Security for Enterprises, 2021

Endpoint security

 

Source: IDC, 2021

What exactly is Modern Endpoint Security (MES)?

According to IDC, MES products combine an endpoint protection platform (EPP) for deterministic prevention, with endpoint detection and response (EDR) for post-compromise reaction. MES is billed as the latest evolution in endpoint security, shifting from point solutions to multifunction platforms, and IDC’s research says that demand for MES is on the rise.

What’s driving the demand?

In a word, time. As IDC’s research VP for Security and Trust, Michael Suby, explains, “Threat actors are finding and exploiting vulnerabilities and weakness in security defenses at a faster pace. Conversely, enterprise security professionals have zero spare time. They must operate faster and more efficiently across a broader IT estate if they ever hope to change circumstances from primarily reacting to threats to getting ahead of threats.”

This is all set against a backdrop of enterprises’ evolving IT footprint across a Work From Anywhere environment, where workers and applications have shifted off premises, and threat actors have not only intensified their focus on endpoints but also advanced their approach.

What criteria should you consider when researching a MES vendor?

IDC presents the following list of MES fundamentals, in order of buyer priority:

  • Protection efficacy – you should pay close attention to the level of vendor research carried out into never-before-seen threats and attack tactics, along with real results they can demonstrate where new forms of attacks are automatically and deterministically blocked. A proof of concept (POC) is recommended here.
  • EDR automation – for incident investigation speed and ease. This helps to focus human engagement more on decision making, and less on investigatory processes. In turn, this helps to reduce threat actors’ dwell time and brings time efficiency gains to your security team.
  • Device support – it’s recommended you check that any MES solution can cover all of your devices and provides unified management, e.g. across recent OS versions of Windows and Mac for PCs, as well as mobile devices, physical and virtual servers, and cloud workloads.

IDC goes on to recommend the examination of cross-function integration, the evaluation of XDR frameworks, questioning ransomware defenses and recovery options, gaining perspective on incorporation of built-in device security capabilities, and finally, the consideration of managed services options.

In this last point, it’s emphasized that a managed service should address your specific needs, from level of engagement, e.g. on-demand collaboration vs around-the-clock outsourcing, to tasks performed, e.g. threat monitoring, threat hunting, and threat response.

Teneo’s WFA: Secured service addresses these points and more. Combining MarketScape-leading technology with elite threat hunting and endpoint detection & response (EDR) capabilities, the service is right-sized to you to help you to eliminate blind spots that a traditional approach to prevention would miss.

You can read more about this service here. To discuss how we can help and to inquire about WFA: Secured in more detail, speak to us today.

 

 

Contact us - We’d love to help you





    Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.