OK, I am being very late here, but the 1st of 2 of our 2016 EDR papers titled “Endpoint Detection and Response Tool Architecture and Operations Practices” has published. Augusto promptly announced it here [while I was working hard in Honolulu…] and so I am late here, but I have some fun quotes. This paper is about using EDR and growing the associated security processes and practices.
A word of warning: this is NOT the EDR vendor comparison you were looking for [that’s paper #2 of 2, and we are not done with it yet]
The quotes follow below:
- “The name “EDR” defines the tool category as related to the endpoint (as opposed to the network) and the tools’ primary usage for both threat detection and IR (rather than deep forensics or prevention of attacks).”
- “Extracting the full value of EDR tools demands mature security operations and IR processes. EDR tools are not very useful for organizations not prepared to handle alerts produced by detection capabilities or without incident response (IR) processes to leverage the additional investigation capabilities.”
- “EDR tools are designed to collect data from potentially compromised endpoints, including those that have been under attacker control for an extended period.” [well, let’s be honest here: the good ones are :-)]
- “Cloud analytics for EDR has an added advantage that the logic of the analysis platform is far removed from any possible attacker and can be changed by its developers easily and for all their clients. Thus, cloud detection methods are theoretically less likely to be reversed by the attacker, who can purchase the server-based solution and reverse-engineer the detection logic.”
- “… after an organization has gone through a protracted, painful, costly IR process — possibly involving hundreds of thousands of dollars in consulting fees for months of investigative work — the business case for a [EDR] tool that can shrink the time for the investigation from months to hours or days practically writes itself.”
- “EDR users report that, although their tools were instrumental in “detecting the undetectable,” they also delivered many other alerts that were not actionable in their environments.”
Enjoy the paper! [Gartner GTP access required]
Blog posts related to our current EDR research:
- One More Time On EDR Use Cases
- EDR Tool Wins – Only For The Enlightened?
- EDR Mud Fight: Kernel or Userland?
- Using EDR For Remediation?
- EDR Research Commencing: Call To Action!
- Where Does EDR End and “NG AV” Begin?
- Reality Check on EDR / ETDR
- My Paper on Endpoint Tools Publishes (2013)
- Endpoint Threat Detection & Response Deployment Architecture
- Essential Processes Around Endpoint Threat Detection & Response Tools
- Named: Endpoint Threat Detection & Response
- Endpoint Visibility Tool Use Cases
- On Endpoint Sensing
- RSA 2013 and Endpoint Agent Re-Emergence
- All posts tagged endpoint
Read Complimentary Relevant Research
Five Golden Rules for Creating Effective Security Policy
Policy writing is a risk communication exercise that is frequently performed by people who lack the skills needed to create good security...
View Relevant Webinars
Equip Your IAM Risk-Based Planning With a Comprehensive Risk Model
Assessment of more than 50 large IAM deployments have shown suboptimal IAM solutions with arbitrary priorities, missing time and budget...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.